Friday, July 10, 18:02
Home security Facebook is fixing serious bugs on the HHVM server

Facebook is fixing serious bugs on the HHVM server


Two critical vulnerabilities in its server application, which could allow remote attackers to obtain unauthorized information or cause denial of service once they download a maliciously crafted image file JPEG, have been discovered and repaired by Facebook.

The vulnerabilities they were discovered on HHVM (Virtual HipHop Machine) - a high performance virtual machine open source developed by Facebook for executing programs written in PHP and Hack programming languages.

Since the affected HHVM server application is open source and free, both issues may affect other sites that use HHVM, including Wikipedia , Box and especially those that allow their users to upload images to the server.

Both vulnerabilities are due to a possible "memory overflow" in the HHVM GD extension, when an attacker inserts a custom JPEG image that allows a malicious program to read data beyond its limits. of memory.

CVE-2019-11925: There are insufficient threshold control problems when editing the JPEG APP12 block marker in the GD extension, enabling potential invaders access the off-line memory by maliciously generating invalid JPEG input.

CVE-2019-11926: Insufficient threshold control problems occur when processing M_SOFx markers from JPEG headers in the GD extension, allowing potential intruders to access off-memory by maliciously generating invalid JPEG input.

Both vulnerabilities affect all supported HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and 4.16.0 to 4.16.3, 4.17 .0 to 4.17.2, 4.18.0, 4.18.1 to 4.19.0.

The HHVM team encountered vulnerabilities with the release of the HHVM versions 4.21.0, 4.20.2, 4.19.1, 4.18.2, 4.17.3, 4.16.4, 4.15.3, 4.8.4 and 3.30.10.

If your site or server also uses HHVM, it is recommended that you update it to the latest version of the software immediately.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


Sony: Invest $ 250 Million in Fortnite Epic Games!

Sony has made an investment of $ 250 million to acquire a 1,4% stake in Epic Games, ...

C-Data FTTH OLT devices contain backdoors

Serious vulnerabilities and backdoors were discovered by two security researchers in the firmware of 29 FTTH OLT devices, the popular equipment provider C-Data.

Spotify, Pinterest and Tinder are "crashing" because of D. Facebook

Popular applications and services, such as Spotify, Pinterest and Tinder, have cracked iOS devices ....

Technology and Teachers: What Do Experts Appreciate?

Too many educators around the world have struggled to adopt the technological tools in the midst of the pandemic to deliver lessons ...

COVID-19 apps: Virus detection applications violate privacy

COVID-19 apps: Beware, they violate private privacy Virus detection applications violate private privacy by recording more data than they need, setting ...

Debian 8 “Jessie”: Another version in End-of-life stage

After a long support of Debian 8 "Jessie", the development team of the operating system announced that it stops ...

Conti ransomware: Is it the successor to Ryuk ransomware?

Conti ransomware is a new threat targeting corporate networks. Its advanced capabilities allow it ...

Smartwatch tracker that helps vulnerable people can be hacked

Researchers have uncovered a number of serious security issues in a smartwatch tracker used in applications, including services designed for ...

WhatsApp: QR codes help you communicate with businesses

Facebook's messaging service, WhatsApp, has introduced two new features to help businesses ...

Zoom: Works to correct zero-day vulnerability

Zoom teleconferencing software works to fix a zero-day vulnerability revealed by the security company ...