exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
References
Link Resource
http://www.securityfocus.com/bid/104551 Third Party Advisory VDB Entry
https://bugs.php.net/bug.php?id=76409 Issue Tracking Patch Vendor Advisory
https://security.netapp.com/advisory/ntap-20181109-0001/ Third Party Advisory
https://usn.ubuntu.com/3702-1/ Third Party Advisory
https://usn.ubuntu.com/3702-2/ Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2018-06-26T03:00:00

Updated: 2018-11-10T10:57:02

Reserved: 2018-06-25T00:00:00


Link: CVE-2018-12882

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-06-26T03:29:00.210

Modified: 2019-03-12T11:46:20.643


Link: CVE-2018-12882

JSON object: View

cve-icon Redhat Information

No data.

CWE