{"id":"BIT-libphp-2023-3824","summary":"Buffer overflow and overread in phar_dir_read()","details":"In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.","aliases":["BIT-php-2023-3824","BIT-php-min-2023-3824","CVE-2023-3824"],"modified":"2026-03-16T03:05:45.890225Z","published":"2025-08-11T13:53:59.498Z","database_specific":{"severity":"Critical","cpes":["cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3824"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20230825-0001/"}],"affected":[{"package":{"name":"libphp","ecosystem":"Bitnami","purl":"pkg:bitnami/libphp"},"ranges":[{"type":"SEMVER","events":[{"introduced":"8.0.0"},{"fixed":"8.0.30"},{"introduced":"8.1.0"},{"fixed":"8.1.22"},{"introduced":"8.2.0"},{"fixed":"8.2.9"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/libphp/BIT-libphp-2023-3824.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}],"schema_version":"1.7.5"}