CVE-2013-3735
31.05.2013, 21:55
The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id.Enginsight
Vendor | Product | Version |
---|---|---|
php | php | 𝑥 ≤ 5.4.15 |
php | php | 5.4.0 |
php | php | 5.4.1 |
php | php | 5.4.2 |
php | php | 5.4.3 |
php | php | 5.4.4 |
php | php | 5.4.5 |
php | php | 5.4.6 |
php | php | 5.4.7 |
php | php | 5.4.8 |
php | php | 5.4.9 |
php | php | 5.4.10 |
php | php | 5.4.11 |
php | php | 5.4.12 |
php | php | 5.4.12:rc1 |
php | php | 5.4.12:rc2 |
php | php | 5.4.13 |
php | php | 5.4.13:rc1 |
php | php | 5.4.14 |
php | php | 5.4.14:rc1 |
php | php | 𝑥 ≤ 5.5.0 |
php | php | 5.5.0:alpha1 |
php | php | 5.5.0:alpha2 |
php | php | 5.5.0:alpha3 |
php | php | 5.5.0:alpha4 |
php | php | 5.5.0:alpha5 |
php | php | 5.5.0:alpha6 |
php | php | 5.5.0:beta1 |
php | php | 5.5.0:beta2 |
php | php | 5.5.0:beta3 |
php | php | 5.5.0:beta4 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References