CVE Vulnerabilities

CVE-2019-11936

Null Byte Interaction Error (Poison Null Byte)

Published: Dec 04, 2019 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Various APC functions accept keys containing null bytes as input, leading to premature truncation of input. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.

Weakness

The product does not properly handle null bytes or NUL characters when passing data between different representations or components.

Affected Software

Name Vendor Start Version End Version
Hhvm Facebook * 3.30.12 (excluding)
Hhvm Facebook 4.0.0 (including) 4.8.5 (including)
Hhvm Facebook 4.9.0 (including) 4.23.1 (including)
Hhvm Facebook 4.24.0 (including) 4.24.0 (including)
Hhvm Facebook 4.25.0 (including) 4.25.0 (including)
Hhvm Facebook 4.26.0 (including) 4.26.0 (including)
Hhvm Facebook 4.27.0 (including) 4.27.0 (including)
Hhvm Facebook 4.28.0 (including) 4.28.0 (including)
Hhvm Facebook 4.28.1 (including) 4.28.1 (including)
Hhvm Ubuntu bionic *
Hhvm Ubuntu trusty *
Hhvm Ubuntu xenial *

Extended Description

A null byte (NUL character) can have different meanings across representations or languages. For example, it is a string terminator in standard C libraries, but Perl and PHP strings do not treat it as a terminator. When two representations are crossed - such as when Perl or PHP invokes underlying C functionality - this can produce an interaction error with unexpected results. Similar issues have been reported for ASP. Other interpreters written in C might also be affected. The poison null byte is frequently useful in path traversal attacks by terminating hard-coded extensions that are added to a filename. It can play a role in regular expression processing in PHP.

Potential Mitigations

References