CVE-2013-3735
Published: 31 May 2013
** DISPUTED ** The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id."
Notes
Author | Note |
---|---|
seth-arnold | PHP interpreter crashes are outside scope of PHP's security model, OS-provided controls must be used to separate untrusted users' code. |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
upstream |
Released
(5.4.16rc1, 5.5.0-rc2)
|
|
Patches: upstream: https://github.com/php/php-src/commit/fb58e69a84f4fde603a630d2c9df2fa3be16d846 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3735
- https://github.com/php/php-src/commit/fb58e69a84f4fde603a630d2c9df2fa3be16d846
- https://github.com/php/php-src/blob/php-5.5.0RC2/NEWS
- https://github.com/php/php-src/blob/php-5.4.16RC1/NEWS
- https://bugs.php.net/bug.php?id=64660
- NVD
- Launchpad
- Debian