In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv | Exploit Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html | Mailing List | 
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ | Mailing List | 
| https://security.netapp.com/advisory/ntap-20230825-0001/ | Third Party Advisory | 
| https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv | Exploit Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html | Mailing List | 
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ | Mailing List | 
| https://security.netapp.com/advisory/ntap-20230825-0001/ | Third Party Advisory | 
Configurations
                    History
                    13 Feb 2025, 17:16
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. | 
21 Nov 2024, 08:18
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv - Exploit, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html - Mailing List | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ - Mailing List | |
| References | () https://security.netapp.com/advisory/ntap-20230825-0001/ - Third Party Advisory | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 9.4  | 
27 Oct 2023, 18:58
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*  | 
|
| First Time | 
        
        Fedoraproject fedora
         Debian Debian debian Linux Fedoraproject  | 
|
| References | (MISC) https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html - Mailing List | |
| References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ - Mailing List | |
| References | (MISC) https://security.netapp.com/advisory/ntap-20230825-0001/ - Third Party Advisory | 
05 Sep 2023, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
25 Aug 2023, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
21 Aug 2023, 16:31
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv - Exploit, Third Party Advisory | |
| References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/ - Third Party Advisory | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 9.8  | 
| First Time | 
        
        Php php
         Php  | 
|
| CPE | cpe:2.3:a:php:php:*:*:*:*:*:*:*:* | |
| CWE | CWE-119 | 
12 Aug 2023, 06:19
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
11 Aug 2023, 06:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-08-11 06:15
Updated : 2025-02-13 17:16
NVD link : CVE-2023-3824
Mitre link : CVE-2023-3824
CVE.ORG link : CVE-2023-3824
JSON object : View
Products Affected
                php
- php
 
debian
- debian_linux
 
fedoraproject
- fedora
 
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
