exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104551 | Third Party Advisory VDB Entry |
https://bugs.php.net/bug.php?id=76409 | Issue Tracking Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20181109-0001/ | Third Party Advisory |
https://usn.ubuntu.com/3702-1/ | Third Party Advisory |
https://usn.ubuntu.com/3702-2/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-06-26T03:00:00
Updated: 2018-11-10T10:57:02
Reserved: 2018-06-25T00:00:00
Link: CVE-2018-12882
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-06-26T03:29:00.210
Modified: 2019-03-12T11:46:20.643
Link: CVE-2018-12882
JSON object: View
Redhat Information
No data.
CWE