CVE-2018-12882
high-risk
Published 2018-06-26
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
Do I need to act?
~
5.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (3)
References (10)
Third Party Advisory
http://www.securityfocus.com/bid/104551
Issue Tracking
https://bugs.php.net/bug.php?id=76409
Third Party Advisory
https://security.netapp.com/advisory/ntap-20181109-0001/
Third Party Advisory
https://usn.ubuntu.com/3702-1/
Third Party Advisory
https://usn.ubuntu.com/3702-2/
Third Party Advisory
http://www.securityfocus.com/bid/104551
Issue Tracking
https://bugs.php.net/bug.php?id=76409
Third Party Advisory
https://security.netapp.com/advisory/ntap-20181109-0001/
Third Party Advisory
https://usn.ubuntu.com/3702-1/
Third Party Advisory
https://usn.ubuntu.com/3702-2/
50
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
9/34 · Low
Exposure
9/34 · Low