Executive Summary

Informations
Name CVE-2013-4248 First vendor Publication 2013-08-17
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18760
 
Oval ID: oval:org.mitre.oval:def:18760
Title: DSA-2742-1 php5 - interpretation conflict
Description: It was discovered that PHP, a general-purpose scripting language commonly used for web application development, did not properly process embedded NUL characters in the subjectAltName extension of X.509 certificates. Depending on the application and with insufficient CA-level checks, this could be abused for impersonating other users.
Family: unix Class: patch
Reference(s): DSA-2742-1
CVE-2013-4248
Version: 8
Platform(s): Debian GNU/Linux 6.0
Debian GNU/Linux 7
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Product(s): php5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18927
 
Oval ID: oval:org.mitre.oval:def:18927
Title: USN-1937-1 -- php5 vulnerability
Description: Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet.
Family: unix Class: patch
Reference(s): USN-1937-1
CVE-2013-4248
Version: 7
Platform(s): Ubuntu 13.04
Ubuntu 12.10
Ubuntu 12.04
Ubuntu 10.04
Product(s): php5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21114
 
Oval ID: oval:org.mitre.oval:def:21114
Title: RHSA-2013:1307: php53 security, bug fix and enhancement update (Moderate)
Description: The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Family: unix Class: patch
Reference(s): RHSA-2013:1307-01
CESA-2013:1307
CVE-2006-7243
CVE-2011-1398
CVE-2012-0831
CVE-2012-2688
CVE-2013-1643
CVE-2013-4248
Version: 87
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): php53
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23222
 
Oval ID: oval:org.mitre.oval:def:23222
Title: ELSA-2013:1307: php53 security, bug fix and enhancement update (Moderate)
Description: The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Family: unix Class: patch
Reference(s): ELSA-2013:1307-01
CVE-2006-7243
CVE-2011-1398
CVE-2012-0831
CVE-2012-2688
CVE-2013-1643
CVE-2013-4248
Version: 29
Platform(s): Oracle Linux 5
Product(s): php53
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25081
 
Oval ID: oval:org.mitre.oval:def:25081
Title: SUSE-SU-2014:0062-1 -- Security update for PHP5
Description: This update fixes the following issues: * memory corruption in openssl_parse_x509 (CVE-2013-6420) * man-in-the-middle attacks by specially crafting certificates (CVE-2013-4248)
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0062-1
CVE-2013-6420
CVE-2013-4248
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
Product(s): PHP5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25595
 
Oval ID: oval:org.mitre.oval:def:25595
Title: SUSE-SU-2014:0064-1 -- Security update for PHP5
Description: This update fixes the following issues: * memory corruption in openssl_parse_x509 (CVE-2013-6420) * Heap buffer over-read in DateInterval (CVE-2013-6712) * man-in-the-middle attacks by specially crafting certificates (CVE-2013-4248)
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0064-1
CVE-2013-6420
CVE-2013-6712
CVE-2013-4248
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
Product(s): PHP5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25611
 
Oval ID: oval:org.mitre.oval:def:25611
Title: SUSE-SU-2014:0063-1 -- Security update for PHP5
Description: This update fixes the following issues: * memory corruption in openssl_parse_x509 (CVE-2013-6420) * Heap buffer over-read in DateInterval (CVE-2013-6712) * man-in-the-middle attacks by specially crafting certificates (CVE-2013-4248)
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0063-1
CVE-2013-6420
CVE-2013-6712
CVE-2013-4248
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
Product(s): PHP5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26232
 
Oval ID: oval:org.mitre.oval:def:26232
Title: SUSE-SU-2014:0873-1 -- Security update for PHP5
Description: PHP5 has been updated to fix four security vulnerabilities.
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0873-1
CVE-2014-4049
CVE-2014-2497
CVE-2013-6420
CVE-2013-4248
Version: 3
Platform(s): SUSE Linux Enterprise Server 10
Product(s): PHP5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26428
 
Oval ID: oval:org.mitre.oval:def:26428
Title: HP-UX Apache Server Suite running Apache Tomcat or PHP, Remote Denial of Service (DoS) and Other Vulnerabilities
Description: The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Family: unix Class: vulnerability
Reference(s): CVE-2013-4248
Version: 4
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27044
 
Oval ID: oval:org.mitre.oval:def:27044
Title: RHSA-2013:1615 -- php security, bug fix, and enhancement update (Moderate)
Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. It was found that PHP did not properly handle file names with a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2006-7243) A flaw was found in PHP's SSL client's hostname identity check when handling certificates that contain hostnames with NULL bytes. If an attacker was able to get a carefully crafted certificate signed by a trusted Certificate Authority, the attacker could use the certificate to conduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248) It was found that the PHP SOAP parser allowed the expansion of external XML entities during SOAP message parsing. A remote attacker could possibly use this flaw to read arbitrary files that are accessible to a PHP application using a SOAP extension. (CVE-2013-1643) This update fixes the following bugs: * Previously, when the allow_call_time_pass_reference setting was disabled, a virtual host on the Apache server could terminate with a segmentation fault when attempting to process certain PHP content. This bug has been fixed and virtual hosts no longer crash when allow_call_time_pass_reference is off. (BZ#892158, BZ#910466) * Prior to this update, if an error occurred during the operation of the fclose(), file_put_contents(), or copy() function, the function did not report it. This could have led to data loss. With this update, the aforementioned functions have been modified to properly report any errors. (BZ#947429) * The internal buffer for the SQLSTATE error code can store maximum of 5 characters. Previously, when certain calls exceeded this limit, a buffer overflow occurred. With this update, messages longer than 5 characters are automatically replaced with the default "HY000" string, thus preventing the overflow. (BZ#969110) In addition, this update adds the following enhancement: * This update adds the following rpm macros to the php package: %__php, %php_inidir, %php_incldir. (BZ#953814) Users of php are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing the updated packages, the httpd daemon must be restarted for the update to take effect.
Family: unix Class: patch
Reference(s): RHSA-2013:1615
CESA-2013:1615
CVE-2006-7243
CVE-2013-1643
CVE-2013-4248
Version: 3
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): php
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27418
 
Oval ID: oval:org.mitre.oval:def:27418
Title: DEPRECATED: ELSA-2013-1307 -- php53 security, bug fix and enhancement update (moderate)
Description: [5.3.3-21] - add security fix for CVE-2013-4248
Family: unix Class: patch
Reference(s): ELSA-2013-1307
CVE-2011-1398
CVE-2012-0831
CVE-2012-2688
CVE-2006-7243
CVE-2013-1643
CVE-2013-4248
Version: 4
Platform(s): Oracle Linux 5
Product(s): php53
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27442
 
Oval ID: oval:org.mitre.oval:def:27442
Title: ELSA-2013-1615 -- php security, bug fix, and enhancement update (moderate)
Description: [5.3.3-26] - add security fix for CVE-2013-4248 [5.3.3-25] - rename patch to math CVE-2010-3709 name - add security fixes for CVE-2006-7243, CVE-2013-1643 [5.3.3-24] - fix buffer overflow in _pdo_pgsql_error (#969110) - fix double free when destroy_zend_class fails (#910466) - fix segfault in error_handler with allow_call_time_pass_reference = Off (#892158) - fix copy doesn't report failure on partial copy (#947428) - add rpm macros for packagers: %php_inidir, %php_incldir and %__php (#953814)
Family: unix Class: patch
Reference(s): ELSA-2013-1615
CVE-2006-7243
CVE-2013-1643
CVE-2013-4248
Version: 3
Platform(s): Oracle Linux 6
Product(s): php
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 473
Os 4
Os 1

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-02-27 IAVM : 2014-A-0030 - Apple Mac OS X Security Update 2014-001
Severity : Category I - VMSKEY : V0044547
2013-08-22 IAVM : 2013-B-0093 - Multiple Vulnerabilities in PHP
Severity : Category I - VMSKEY : V0040108

Nessus® Vulnerability Scanner

Date Description
2015-05-20 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2014-0064-1.nasl - Type : ACT_GATHER_INFO
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_php_20140522.nasl - Type : ACT_GATHER_INFO
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_php_20140401.nasl - Type : ACT_GATHER_INFO
2014-11-12 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-1615.nasl - Type : ACT_GATHER_INFO
2014-11-12 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-1307.nasl - Type : ACT_GATHER_INFO
2014-08-30 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201408-11.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-1032.nasl - Type : ACT_GATHER_INFO
2014-02-25 Name : The remote host is missing a Mac OS X update that fixes multiple security vul...
File : macosx_SecUpd2014-001.nasl - Type : ACT_GATHER_INFO
2014-02-25 Name : The remote host is missing a Mac OS X update that fixes a certificate validat...
File : macosx_10_9_2.nasl - Type : ACT_GATHER_INFO
2014-01-27 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-024.nasl - Type : ACT_GATHER_INFO
2014-01-22 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-014.nasl - Type : ACT_GATHER_INFO
2014-01-15 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_apache2-mod_php53-131218.nasl - Type : ACT_GATHER_INFO
2014-01-15 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_apache2-mod_php5-131220.nasl - Type : ACT_GATHER_INFO
2013-12-04 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20131121_php_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2013-11-27 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-1615.nasl - Type : ACT_GATHER_INFO
2013-11-21 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1615.nasl - Type : ACT_GATHER_INFO
2013-10-11 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130930_php53_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2013-10-03 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-1307.nasl - Type : ACT_GATHER_INFO
2013-10-01 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1307.nasl - Type : ACT_GATHER_INFO
2013-10-01 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2013-224.nasl - Type : ACT_GATHER_INFO
2013-09-09 Name : The remote Fedora host is missing a security update.
File : fedora_2013-14985.nasl - Type : ACT_GATHER_INFO
2013-09-06 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1937-1.nasl - Type : ACT_GATHER_INFO
2013-09-02 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2013-242-02.nasl - Type : ACT_GATHER_INFO
2013-08-28 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-221.nasl - Type : ACT_GATHER_INFO
2013-08-27 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2742.nasl - Type : ACT_GATHER_INFO
2013-08-25 Name : The remote Fedora host is missing a security update.
File : fedora_2013-14998.nasl - Type : ACT_GATHER_INFO
2013-08-21 Name : The remote web server uses a version of PHP that is potentially affected by m...
File : php_5_5_2.nasl - Type : ACT_GATHER_INFO
2013-08-21 Name : The remote web server uses a version of PHP that is potentially affected by m...
File : php_5_4_18.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2874696a5a8d46639d261571f915...
Source Url
BID http://www.securityfocus.com/bid/61776
CONFIRM http://support.apple.com/kb/HT6150
http://www.php.net/ChangeLog-5.php
DEBIAN http://www.debian.org/security/2013/dsa-2742
HP http://marc.info/?l=bugtraq&m=141390017113542&w=2
REDHAT http://rhn.redhat.com/errata/RHSA-2013-1307.html
http://rhn.redhat.com/errata/RHSA-2013-1615.html
SECTRACK http://www.securitytracker.com/id/1028924
SECUNIA http://secunia.com/advisories/54478
http://secunia.com/advisories/54657
http://secunia.com/advisories/55078
http://secunia.com/advisories/59652
SUSE http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html
http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html
UBUNTU http://www.ubuntu.com/usn/USN-1937-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
Date Informations
2024-02-02 01:24:05
  • Multiple Updates
2024-02-01 12:07:11
  • Multiple Updates
2023-11-07 21:46:00
  • Multiple Updates
2023-09-05 12:22:45
  • Multiple Updates
2023-09-05 01:07:05
  • Multiple Updates
2023-09-02 12:22:47
  • Multiple Updates
2023-09-02 01:07:10
  • Multiple Updates
2023-08-22 12:20:31
  • Multiple Updates
2023-03-28 12:07:08
  • Multiple Updates
2022-10-11 01:06:51
  • Multiple Updates
2021-05-04 12:27:10
  • Multiple Updates
2021-04-22 01:32:53
  • Multiple Updates
2020-05-24 01:12:00
  • Multiple Updates
2020-05-23 00:37:56
  • Multiple Updates
2019-06-08 12:05:33
  • Multiple Updates
2018-10-03 12:03:41
  • Multiple Updates
2018-03-13 12:04:58
  • Multiple Updates
2016-11-29 00:24:49
  • Multiple Updates
2016-10-05 01:01:09
  • Multiple Updates
2016-06-28 19:38:52
  • Multiple Updates
2016-04-26 23:31:33
  • Multiple Updates
2015-11-20 21:25:08
  • Multiple Updates
2015-05-21 13:30:45
  • Multiple Updates
2015-01-21 13:26:20
  • Multiple Updates
2014-12-03 09:26:38
  • Multiple Updates
2014-11-13 13:26:53
  • Multiple Updates
2014-08-31 13:24:56
  • Multiple Updates
2014-07-17 09:21:38
  • Multiple Updates
2014-06-14 13:36:01
  • Multiple Updates
2014-03-06 13:22:39
  • Multiple Updates
2014-02-28 17:19:12
  • Multiple Updates
2014-02-26 13:21:13
  • Multiple Updates
2014-02-17 11:21:52
  • Multiple Updates
2014-01-24 13:19:21
  • Multiple Updates
2014-01-14 13:20:34
  • Multiple Updates
2014-01-04 13:19:32
  • Multiple Updates
2013-11-11 12:40:43
  • Multiple Updates
2013-10-23 21:19:59
  • Multiple Updates
2013-10-11 13:27:04
  • Multiple Updates
2013-09-12 13:20:48
  • Multiple Updates
2013-09-11 13:20:53
  • Multiple Updates
2013-08-30 17:22:47
  • Multiple Updates
2013-08-20 17:22:58
  • First insertion