Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
References
Link | Resource |
---|---|
https://www.facebook.com/security/advisories/cve-2019-11935 | Vendor Advisory |
https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7 | Patch Third Party Advisory |
https://hhvm.com/blog/2019/10/28/security-update.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-12-04 09:16
Updated : 2019-12-11 10:32
NVD link : CVE-2019-11935
Mitre link : CVE-2019-11935
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
- hhvm