Executive Summary
Summary | |
---|---|
Title | php53 security update |
Informations | |||
---|---|---|---|
Name | RHSA-2013:1062 | First vendor Publication | 2013-07-15 |
Vendor | RedHat | Last vendor Modification | 2013-07-15 |
Severity (Vendor) | Critical | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated php53 packages that fix one security issue are now available for Red Hat Enterprise Linux 5.6 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, ppc, s390x, x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. A buffer overflow flaw was found in the way PHP parsed deeply nested XML documents. If a PHP application used the xml_parse_into_struct() function to parse untrusted XML content, an attacker able to supply specially-crafted XML could use this flaw to crash the application or, possibly, execute arbitrary code with the privileges of the user running the PHP interpreter. (CVE-2013-4113) All php53 users should upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing the updated packages, the httpd daemon must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 983689 - CVE-2013-4113 php: xml_parse_into_struct buffer overflow when parsing deeply nested XML |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2013-1062.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18965 | |||
Oval ID: | oval:org.mitre.oval:def:18965 | ||
Title: | DSA-2723-1 php5 - heap corruption | ||
Description: | It was discovered that PHP could perform an invalid free request when processing crafted XML documents, corrupting the heap and potentially leading to arbitrary code execution. Depending on the PHP application, this vulnerability could be exploited remotely. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2723-1 CVE-2013-4113 | Version: | 8 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | php5 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2014-02-27 | IAVM : 2014-A-0030 - Apple Mac OS X Security Update 2014-001 Severity : Category I - VMSKEY : V0044547 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-11-19 | PHP tag depth heap memory corruption attempt RuleID : 51930 - Revision : 1 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-07-31 | Name : The remote device is affected by multiple vulnerabilities. File : juniper_jsa10804.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-1316-1.nasl - Type : ACT_GATHER_INFO |
2015-05-15 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15169.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_php_20140401.nasl - Type : ACT_GATHER_INFO |
2014-11-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1062.nasl - Type : ACT_GATHER_INFO |
2014-11-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1061.nasl - Type : ACT_GATHER_INFO |
2014-08-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201408-11.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-604.nasl - Type : ACT_GATHER_INFO |
2014-02-25 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_SecUpd2014-001.nasl - Type : ACT_GATHER_INFO |
2014-02-25 | Name : The remote host is missing a Mac OS X update that fixes a certificate validat... File : macosx_10_9_2.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-211.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-212.nasl - Type : ACT_GATHER_INFO |
2013-08-21 | Name : The remote web server uses a version of PHP that is potentially affected by m... File : php_5_4_18.nasl - Type : ACT_GATHER_INFO |
2013-08-14 | Name : The remote web server uses a version of PHP that is potentially affected by a... File : php_5_5_1.nasl - Type : ACT_GATHER_INFO |
2013-08-10 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php5-130718.nasl - Type : ACT_GATHER_INFO |
2013-08-10 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php53-130717.nasl - Type : ACT_GATHER_INFO |
2013-08-10 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php53-130718.nasl - Type : ACT_GATHER_INFO |
2013-08-01 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-mod_php5-8647.nasl - Type : ACT_GATHER_INFO |
2013-07-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1063.nasl - Type : ACT_GATHER_INFO |
2013-07-23 | Name : The remote Fedora host is missing a security update. File : fedora_2013-12315.nasl - Type : ACT_GATHER_INFO |
2013-07-23 | Name : The remote Fedora host is missing a security update. File : fedora_2013-12354.nasl - Type : ACT_GATHER_INFO |
2013-07-19 | Name : The remote Fedora host is missing a security update. File : fedora_2013-12977.nasl - Type : ACT_GATHER_INFO |
2013-07-18 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2723.nasl - Type : ACT_GATHER_INFO |
2013-07-17 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2013-197-01.nasl - Type : ACT_GATHER_INFO |
2013-07-17 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_31b145f2d9d349a9802311cf742205dc.nasl - Type : ACT_GATHER_INFO |
2013-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1905-1.nasl - Type : ACT_GATHER_INFO |
2013-07-14 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-195.nasl - Type : ACT_GATHER_INFO |
2013-07-14 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130712_php_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-07-14 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130712_php53_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-07-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1050.nasl - Type : ACT_GATHER_INFO |
2013-07-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1049.nasl - Type : ACT_GATHER_INFO |
2013-07-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1050.nasl - Type : ACT_GATHER_INFO |
2013-07-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1049.nasl - Type : ACT_GATHER_INFO |
2013-07-14 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1050.nasl - Type : ACT_GATHER_INFO |
2013-07-14 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1049.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote web server uses a version of PHP that is potentially affected by m... File : php_5_3_27.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-11-18 13:26:10 |
|
2013-07-16 00:18:20 |
|