{"id":"CVE-2023-3824","details":"In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.","aliases":["BIT-libphp-2023-3824","BIT-php-2023-3824","BIT-php-min-2023-3824"],"modified":"2026-04-10T04:58:59.860600Z","published":"2023-08-11T06:15:10.560Z","related":["ALSA-2023:5926","ALSA-2023:5927","ALSA-2024:0387","ALSA-2024:10952","GHSA-jqcx-ccgc-xwhv","MGASA-2023-0248","SUSE-SU-2023:3445-1","SUSE-SU-2023:3498-1","SUSE-SU-2023:3528-1","SUSE-SU-2023:3541-1","openSUSE-SU-2024:13153-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230825-0001/"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/"},{"type":"EVIDENCE","url":"https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"5dc92c2117cafc61daaaaa240fd46c3ac33872a4"},{"fixed":"8213daa932be1c2ae04726233e4e56e5df63980e"},{"introduced":"381ba9f5d0edd0c9c8ec1dea7e21d513ad08b115"},{"fixed":"5ffbd1ad43d2a98cd1fd91e2b20672fac30cd4c0"},{"introduced":"70ee6c20ad97e02c2b8098aeea96fefbbc3ac5c2"},{"fixed":"3d832da8f53d2c2f93d4ffbd1c807d9a5d66536b"}],"database_specific":{"versions":[{"introduced":"8.0.0"},{"fixed":"8.0.30"},{"introduced":"8.1.0"},{"fixed":"8.1.22"},{"introduced":"8.2.0"},{"fixed":"8.2.9"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-3824.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}