{"id":"CVE-2020-7060","details":"When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.","aliases":["BIT-libphp-2020-7060","BIT-php-2020-7060","BIT-php-min-2020-7060"],"modified":"2026-04-16T04:32:44.221004436Z","published":"2020-02-10T08:15:12.797Z","related":["ALSA-2020:3662","SUSE-SU-2020:0397-1","SUSE-SU-2020:0522-1","SUSE-SU-2020:0622-1","SUSE-SU-2022:4067-1","openSUSE-SU-2020:0341-1"],"references":[{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2020/Feb/27"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2021/Jan/3"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-57"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2020/Feb/31"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200221-0002/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4626"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4628"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html"},{"type":"FIX","url":"https://usn.ubuntu.com/4279-1/"},{"type":"FIX","url":"https://www.tenable.com/security/tns-2021-14"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=79037"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"8148cbb78841c8ec0759c0836e7f35dec799d300"},{"fixed":"40c86aa3af2e25971e9c13460ca874348456410d"},{"introduced":"52ace952a1b65ca80fc2617f11c2fa6dd03f51bd"},{"fixed":"4b2854db6fd2fae5a950ae7ce25257ee08cee916"},{"introduced":"3c7824e16ec4c3cee417262445d2c2b66531c10f"},{"fixed":"264ef4f16300270dd4e92d2510660836a4814579"},{"introduced":"5dc92c2117cafc61daaaaa240fd46c3ac33872a4"},{"last_affected":"b437f2b32eb364c9496d24abcc734272e5c9c980"},{"introduced":"0"},{"last_affected":"5dc92c2117cafc61daaaaa240fd46c3ac33872a4"}],"database_specific":{"versions":[{"introduced":"7.2.0"},{"fixed":"7.2.27"},{"introduced":"7.3.0"},{"fixed":"7.3.14"},{"introduced":"7.4.0"},{"fixed":"7.4.2"},{"introduced":"8.0"},{"last_affected":"8.4"},{"introduced":"0"},{"last_affected":"8.0"}]}}],"versions":["POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","php-7.3.14RC1","php-8.0.0","php-8.4.0","security-audit-2024"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.19.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-7060.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}