{"id":"CVE-2019-11043","details":"In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.","modified":"2026-04-16T04:31:21.656987632Z","published":"2019-10-28T15:15:13.863Z","related":["ALSA-2019:3735","ALSA-2019:3736","SUSE-SU-2019:2809-1","SUSE-SU-2019:2819-1","SUSE-SU-2019:2909-1","SUSE-SU-2020:0522-1","SUSE-SU-2022:4067-1","openSUSE-SU-2019:2441-1","openSUSE-SU-2019:2457-1","openSUSE-SU-2024:11167-1","openSUSE-SU-2024:11169-1"],"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4166-2/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3286"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3287"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3736"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0322"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2020/Jan/40"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3300"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3735"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2020/Jan/44"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20191031-0003/"},{"type":"ADVISORY","url":"https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4166-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4552"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4553"},{"type":"ADVISORY","url":"https://www.synology.com/security/advisory/Synology_SA_19_36"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2021-14"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3724"},{"type":"ADVISORY","url":"https://support.apple.com/kb/HT210919"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=78599"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html"},{"type":"EVIDENCE","url":"https://github.com/neex/phuip-fpizdam"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0221e9f827632942225586687a33cfd554860d5e"},{"fixed":"326cd05dae2eb411d5fdacede8a4bfa7a0798182"},{"introduced":"8148cbb78841c8ec0759c0836e7f35dec799d300"},{"fixed":"d41dd0b518cd831c50d0f441aa5fc561d55bff66"},{"introduced":"52ace952a1b65ca80fc2617f11c2fa6dd03f51bd"},{"fixed":"335008f6b2040e34cc3253b83e4a6377a95d6e6c"},{"introduced":"0"},{"last_affected":"c7fdb98bc59fe743c682e1362456474da6c92402"},{"introduced":"0"},{"last_affected":"5dc92c2117cafc61daaaaa240fd46c3ac33872a4"},{"introduced":"0"},{"last_affected":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"introduced":"0"},{"last_affected":"381ba9f5d0edd0c9c8ec1dea7e21d513ad08b115"},{"introduced":"0"},{"last_affected":"70ee6c20ad97e02c2b8098aeea96fefbbc3ac5c2"},{"introduced":"0"},{"last_affected":"b437f2b32eb364c9496d24abcc734272e5c9c980"},{"introduced":"0"},{"last_affected":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"introduced":"0"},{"last_affected":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"introduced":"0"},{"last_affected":"70ee6c20ad97e02c2b8098aeea96fefbbc3ac5c2"},{"introduced":"0"},{"last_affected":"b437f2b32eb364c9496d24abcc734272e5c9c980"},{"introduced":"0"},{"last_affected":"70ee6c20ad97e02c2b8098aeea96fefbbc3ac5c2"},{"introduced":"0"},{"last_affected":"b437f2b32eb364c9496d24abcc734272e5c9c980"},{"introduced":"0"},{"last_affected":"60fffd296abce5fc071f3c173c25a2696cf683c6"}],"database_specific":{"versions":[{"introduced":"7.1.0"},{"fixed":"7.1.33"},{"introduced":"7.2.0"},{"fixed":"7.2.24"},{"introduced":"7.3.0"},{"fixed":"7.3.11"},{"introduced":"0"},{"last_affected":"1.0"},{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"7.0"},{"introduced":"0"},{"last_affected":"8.1"},{"introduced":"0"},{"last_affected":"8.2"},{"introduced":"0"},{"last_affected":"8.4"},{"introduced":"0"},{"last_affected":"7.0"},{"introduced":"0"},{"last_affected":"7.0"},{"introduced":"0"},{"last_affected":"8.2"},{"introduced":"0"},{"last_affected":"8.4"},{"introduced":"0"},{"last_affected":"8.2"},{"introduced":"0"},{"last_affected":"8.4"},{"introduced":"0"},{"last_affected":"7.0"}]}}],"versions":["POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","RELEASE_1_0","php-7.0.0","php-7.0.0RC1","php-7.0.0RC2","php-7.0.0RC3","php-7.0.0RC4","php-7.0.0RC5","php-7.0.0RC6","php-7.0.0RC7","php-7.0.0RC8","php-7.0.0alpha1","php-7.0.0alpha2","php-7.0.0beta1","php-7.0.0beta2","php-7.0.0beta3","php-7.1.31","php-7.1.32","php-7.3.11RC1","php-8.0.0","php-8.1.0","php-8.2.0","php-8.4.0","security-audit-2024"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"fixed":"5.19.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6"}]},{"events":[{"introduced":"0"},{"last_affected":"8.8"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0_aarch64"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1_aarch64"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2_aarch64"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4_aarch64"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6_aarch64"}]},{"events":[{"introduced":"0"},{"last_affected":"8.8_aarch64"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0_s390x"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0_s390x"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0_s390x"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7_s390x"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1_s390x"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2_s390x"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4_s390x"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6_s390x"}]},{"events":[{"introduced":"0"},{"last_affected":"8.8_s390x"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0_ppc64"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0_ppc64"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7_ppc64"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0_ppc64le"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0_ppc64le"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7_ppc64le"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1_ppc64le"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2_ppc64le"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4_ppc64le"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6_ppc64le"}]},{"events":[{"introduced":"0"},{"last_affected":"8.8_ppc64le"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6"}]},{"events":[{"introduced":"0"},{"last_affected":"8.8"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-11043.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}