{"id":"BIT-php-2023-3824","summary":"Buffer overflow and overread in phar_dir_read()","details":"In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.","aliases":["BIT-libphp-2023-3824","BIT-php-min-2023-3824","CVE-2023-3824"],"modified":"2026-03-16T03:07:47.753305Z","published":"2024-03-06T11:01:21.777Z","database_specific":{"cpes":["cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"],"severity":"Critical"},"references":[{"type":"WEB","url":"https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20230825-0001/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3824"}],"affected":[{"package":{"name":"php","ecosystem":"Bitnami","purl":"pkg:bitnami/php"},"ranges":[{"type":"SEMVER","events":[{"introduced":"8.0.0"},{"fixed":"8.0.30"},{"introduced":"8.1.0"},{"fixed":"8.1.22"},{"introduced":"8.2.0"},{"fixed":"8.2.9"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/php/BIT-php-2023-3824.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}],"schema_version":"1.7.5"}