CVE-2018-10545

LOW

Description

An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.

References

http://php.net/ChangeLog-5.php

http://php.net/ChangeLog-7.php

http://www.securityfocus.com/bid/104022

https://bugs.php.net/bug.php?id=75605

https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html

https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html

https://security.gentoo.org/glsa/201812-01

https://security.netapp.com/advisory/ntap-20180607-0003/

https://usn.ubuntu.com/3646-1/

https://usn.ubuntu.com/3646-2/

https://www.debian.org/security/2018/dsa-4240

https://www.tenable.com/security/tns-2018-12

Details

Source: MITRE

Published: 2018-04-29

Updated: 2019-03-18

Type: CWE-200

Risk Information

CVSS v2.0

Base Score: 1.9

Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.4

Severity: LOW

CVSS v3.0

Base Score: 4.7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 1

Severity: MEDIUM