CVE-2013-3735
Published May 31, 2013
Last updated 3 months ago
Overview
- Description
- The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id.
- Source
- cve@mitre.org
- NVD status
- Modified
- CNA Tags
- disputed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:php:php:*:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E16F8866-A969-4C31-A5FF-32D4DEE24C91", "versionEndIncluding": "5.4.15" }, { "criteria": "cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7B9B8D2-78B7-4B17-955B-741C7A6F6634" }, { "criteria": "cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CA2A940-BD69-4D35-AF12-432CB929248B" }, { "criteria": "cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29BD13F9-86C8-44C4-A860-9A87870A518E" }, { "criteria": "cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B361FDE-9F6A-4E9A-96F1-619DC56EECB6" }, { "criteria": "cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DBD9E7B-1237-47A8-8A07-5CC5246A9C5A" }, { "criteria": "cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F2BB41E-2096-4291-B0ED-06825FDFE8BF" }, { "criteria": "cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52BA94F7-1AF9-415C-AC21-30BC25C74C5D" }, { "criteria": "cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0A739A0-698A-422B-886B-430A79F6E945" }, { "criteria": "cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "086E0D24-A43E-4CEA-9FB0-FE193B88CC31" }, { "criteria": "cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC8D0963-8CA5-4814-9B6D-4E1C3907737B" }, { "criteria": "cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77A4B7E0-C872-4E53-AD72-1BB2755E4FDA" }, { "criteria": "cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EECCD553-53D5-485E-8C21-E2A5070833B2" }, { "criteria": "cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95357C79-A754-4E0C-B65B-0FA241962B12" }, { "criteria": "cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25EAF9A9-F7A1-4AC7-BCFD-769BE0FDB537" }, { "criteria": "cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74EA8037-7C22-48B3-9FA2-4BFFFFD513D1" }, { "criteria": "cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8D1254E-0C72-4958-BA7F-5B818C3ACB15" }, { "criteria": "cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92994FFC-F362-48AC-9CA8-8EBCAC880C91" }, { "criteria": "cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21131DF1-1EE5-4C84-B1E0-FA75BC39B344" }, { "criteria": "cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B23F85D-465B-4176-9798-E78AADE421EC" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:php:php:*:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3004D4C-C790-4422-9FF8-9F7C5ADA808C", "versionEndIncluding": "5.5.0" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D25E591-448C-4E3B-8557-6E48F7571796" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DA18F3F-B4B5-40C3-BF19-67C1F0C1787D" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AF783C9-26E7-4E02-BD41-77B9783667E3" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF49701D-ECE4-4CEB-BDAB-24C09C8AD4B4" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AEDF6F7-001D-4A35-A26F-417991AD377F" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4031DB99-B4B4-41EC-B3C1-543D92C575A9" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5450EA7-A398-49D2-AA8E-7C95B074BAB1" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04FE0E4E-BC94-4DC9-BE9B-DC57B952B2FB" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB8E09D8-9CBE-4279-88B7-24A214A5A537" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D41ECCE-887D-49A2-9BB3-B559495AC55B" } ], "operator": "OR" } ] } ]