CVE-2019-11041
📋 TL;DR
This vulnerability in PHP's EXIF extension allows attackers to cause buffer over-read when parsing EXIF data from images via functions like exif_read_data(). This can lead to information disclosure or application crashes. It affects PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21, and 7.3.x below 7.3.8.
💻 Affected Systems
- PHP
📦 What is this software?
Leap by Opensuse
Php by Php
Php by Php
Php by Php
Tenable.sc by Tenable
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
⚠️ Risk & Real-World Impact
Worst Case
Memory disclosure revealing sensitive information like passwords, session tokens, or private keys from PHP process memory, potentially leading to full system compromise.
Likely Case
Application crashes causing denial of service, with possible limited information disclosure from adjacent memory.
If Mitigated
Minimal impact if proper input validation and memory protections are in place, though crashes may still occur.
🎯 Exploit Status
Exploitation requires uploading or providing a specially crafted image file to a vulnerable PHP application. Public proof-of-concept code exists in disclosure references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: PHP 7.1.31, 7.2.21, 7.3.8
Vendor Advisory: https://bugs.php.net/bug.php?id=78222
Restart Required: Yes
Instructions:
1. Update PHP to version 7.1.31, 7.2.21, or 7.3.8 or higher. 2. Restart PHP-FPM or web server (Apache/Nginx). 3. Verify the update with php -v command.
🔧 Temporary Workarounds
Disable EXIF extension
allDisable the EXIF extension if not required by your application.
Remove or comment 'extension=exif' in php.ini
Input validation for image uploads
allImplement strict validation and sanitization of uploaded image files before processing.
🧯 If You Can't Patch
- Implement Web Application Firewall (WAF) rules to block malicious image uploads
- Disable image upload functionality or restrict to trusted sources only
🔍 How to Verify
Check if Vulnerable:
Check PHP version and if EXIF extension is enabled: php -m | grep exif && php -v
Check Version:
php -v | head -1
Verify Fix Applied:
Confirm PHP version is 7.1.31+, 7.2.21+, or 7.3.8+ and test EXIF parsing with known safe images.
📡 Detection & Monitoring
Log Indicators:
- PHP segmentation fault errors
- Unexpected memory access warnings in PHP logs
- Multiple failed image upload attempts
Network Indicators:
- Unusual image file uploads to PHP applications
- Large number of image processing requests
SIEM Query:
source="php_error.log" AND ("segmentation fault" OR "buffer over-read" OR "exif_read_data")
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html
- http://seclists.org/fulldisclosure/2019/Oct/15
- http://seclists.org/fulldisclosure/2019/Oct/55
- https://access.redhat.com/errata/RHSA-2019:3299
- https://bugs.php.net/bug.php?id=78222
- https://lists.debian.org/debian-lts-announce/2019/08/msg00010.html
- https://seclists.org/bugtraq/2019/Oct/9
- https://seclists.org/bugtraq/2019/Sep/35
- https://seclists.org/bugtraq/2019/Sep/38
- https://security.netapp.com/advisory/ntap-20190822-0003/
- https://support.apple.com/kb/HT210634
- https://support.apple.com/kb/HT210722
- https://usn.ubuntu.com/4097-1/
- https://usn.ubuntu.com/4097-2/
- https://www.debian.org/security/2019/dsa-4527
- https://www.debian.org/security/2019/dsa-4529
- https://www.tenable.com/security/tns-2021-14
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html
- http://seclists.org/fulldisclosure/2019/Oct/15
- http://seclists.org/fulldisclosure/2019/Oct/55
- https://access.redhat.com/errata/RHSA-2019:3299
- https://bugs.php.net/bug.php?id=78222
- https://lists.debian.org/debian-lts-announce/2019/08/msg00010.html
- https://seclists.org/bugtraq/2019/Oct/9
- https://seclists.org/bugtraq/2019/Sep/35
- https://seclists.org/bugtraq/2019/Sep/38
- https://security.netapp.com/advisory/ntap-20190822-0003/
- https://support.apple.com/kb/HT210634
- https://support.apple.com/kb/HT210722
- https://usn.ubuntu.com/4097-1/
- https://usn.ubuntu.com/4097-2/
- https://www.debian.org/security/2019/dsa-4527
- https://www.debian.org/security/2019/dsa-4529
- https://www.tenable.com/security/tns-2021-14