Vulnerability Description
In PHP versions prior to 7.4.33, 8.0.25 and 8.1.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | >= 7.4.0, < 7.4.33 |
Related Weaknesses (CWE)
References
- https://bugs.php.net/bug.php?id=81739ExploitIssue TrackingPatch
- https://bugs.php.net/bug.php?id=81739ExploitIssue TrackingPatch
FAQ
What is CVE-2022-31630?
CVE-2022-31630 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In PHP versions prior to 7.4.33, 8.0.25 and 8.1.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with...
How severe is CVE-2022-31630?
CVE-2022-31630 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-31630?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.