18 Juil 2019
Vulnérabilité CVE-2019-3570 CVE Vulnerability
Call to the scrypt_enc() function in HHVM can lead to heap corruption by using specifically crafted parameters (N, r and p). This happens if the parameters are configurable by an attacker for instance by providing the output of scrypt_enc() in a context where Hack/PHP code would attempt to verify it by re-running scrypt_enc() with the same parameters. This could result in information disclosure, memory being overwriten or crashes of the HHVM process. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series. (CVSS:0.0) (Last Update:2019-07-18)
Vulnerability Details : Call to the scrypt_enc() function in HHVM can lead to heap corruption by using specifically crafted parameters (N, r and p). This happens if the parameters are configurable by an attacker for instance by providing the output of scrypt_enc() in a context where Hack/PHP code would attempt to verify it by re-running scrypt_enc() with the same parameters. This could result in information disclosure, memory being overwriten or crashes of the HHVM process. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series. Publish Date : 2019-07-18 Last Update Date : 2019-07-18 - CVSS Scores & Vulnerability Types
- Products Affected By CVE-2019-3570
- References For CVE-2019-3570
| |||||||||||||||||||||||||||||||||||||||||||||||
- Metasploit Modules Related To CVE-2019-3570There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information) |