FKIE_CVE-2013-4248

Vulnerability from fkie_nvd - Published: 2013-08-18 02:52 - Updated: 2025-04-11 00:51
Severity ?
Summary
The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
secalert@redhat.comhttp://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2874696a5a8d46639d261571f915c493cd875897
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=141390017113542&w=2
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-1307.htmlVendor Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-1615.html
secalert@redhat.comhttp://secunia.com/advisories/54478Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/54657Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/55078Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/59652
secalert@redhat.comhttp://support.apple.com/kb/HT6150
secalert@redhat.comhttp://www.debian.org/security/2013/dsa-2742
secalert@redhat.comhttp://www.php.net/ChangeLog-5.php
secalert@redhat.comhttp://www.securityfocus.com/bid/61776
secalert@redhat.comhttp://www.securitytracker.com/id/1028924
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1937-1Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2874696a5a8d46639d261571f915c493cd875897
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=141390017113542&w=2
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1307.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1615.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/54478Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/54657Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/55078Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59652
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT6150
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2742
af854a3a-2127-422b-91ae-364da2661108http://www.php.net/ChangeLog-5.php
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/61776
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1028924
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1937-1Vendor Advisory
Impacted products
Vendor Product Version
canonical ubuntu_linux 10.04
canonical ubuntu_linux 12.04
canonical ubuntu_linux 12.10
canonical ubuntu_linux 13.04
php php *
php php 5.0.0
php php 5.0.0
php php 5.0.0
php php 5.0.0
php php 5.0.0
php php 5.0.0
php php 5.0.0
php php 5.0.0
php php 5.0.1
php php 5.0.2
php php 5.0.3
php php 5.0.4
php php 5.0.5
php php 5.1.0
php php 5.1.1
php php 5.1.2
php php 5.1.3
php php 5.1.4
php php 5.1.5
php php 5.1.6
php php 5.2.0
php php 5.2.1
php php 5.2.2
php php 5.2.3
php php 5.2.4
php php 5.2.5
php php 5.2.6
php php 5.2.7
php php 5.2.8
php php 5.2.9
php php 5.2.10
php php 5.2.11
php php 5.2.12
php php 5.2.13
php php 5.2.14
php php 5.2.15
php php 5.2.16
php php 5.2.17
php php 5.3.0
php php 5.3.1
php php 5.3.2
php php 5.3.3
php php 5.3.4
php php 5.3.5
php php 5.3.6
php php 5.3.7
php php 5.3.8
php php 5.3.9
php php 5.3.10
php php 5.3.11
php php 5.3.12
php php 5.3.13
php php 5.3.14
php php 5.3.15
php php 5.3.16
php php 5.3.17
php php 5.3.18
php php 5.3.19
php php 5.3.20
php php 5.3.21
php php 5.3.22
php php 5.3.23
php php 5.3.24
php php 5.3.25
php php 5.3.26
php php 5.3.27
php php 5.4.0
php php 5.4.1
php php 5.4.2
php php 5.4.3
php php 5.4.4
php php 5.4.5
php php 5.4.6
php php 5.4.7
php php 5.4.8
php php 5.4.9
php php 5.4.10
php php 5.4.11
php php 5.4.12
php php 5.4.12
php php 5.4.12
php php 5.4.13
php php 5.4.13
php php 5.4.14
php php 5.4.14
php php 5.4.15
php php 5.4.16
php php 5.5.0
php php 5.5.1
redhat enterprise_linux 5

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
              "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
              "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09AD45B-A888-45E3-84A9-AA600940BC8B",
              "versionEndIncluding": "5.4.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7007E77F-60EF-44D8-9676-15B59DF1325F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "E727CECE-E452-489A-A42F-5A069D6AF80E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "149A1FB8-593E-412B-8E1C-3E560301D500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5D6E8982-D7AE-4A52-8F7C-A4D59D2A2CA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8FC144FA-8F84-44C0-B263-B639FEAD20FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "295907B4-C3DE-4021-BE3B-A8826D4379E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "DBC98F82-6E1D-4A89-8ED4-ECD9BD954EB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "B881352D-954E-4FC0-9E42-93D02A3F3089",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E7AE59-1CB0-4300-BBE0-109F909789EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9222821E-370F-4616-B787-CC22C2F4E7CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9809449F-9A76-4318-B233-B4C2950A6EA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AA962D4-A4EC-4DC3-B8A9-D10941B92781",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8CDFEF9-C367-4800-8A2F-375C261FAE55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E43B88-1563-4EFD-9267-AE3E8C35D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E5715F-A8BC-49EF-836B-BB78E1BC0790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA68843-158E-463E-B68A-1ACF041C4E10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1874F637-77E2-4C4A-BF92-AEE96A60BFB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9592B32E-55CD-42D0-901E-8319823BC820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9BF34B5-F74C-4D56-9841-42452D60CB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD02D837-FD28-4E0F-93F8-25E8D1C84A99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88358D1E-BE6F-4CE3-A522-83D1FA4739E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B97B03-7DA7-4A5F-89B4-E78CAB20DE17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86767200-6C9C-4C3E-B111-0E5BE61E197B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00B416D-FF23-4C76-8751-26D305F0FA0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB6CDDD-70D3-4004-BCE0-8C4723076103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A782CA26-9C38-40A8-92AE-D47B14D2FCE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C0E7E2A-4770-4B68-B74C-5F5A6E1876DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0892C89E-9389-4452-B7E0-981A763CD426",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "635F3CB1-B042-43CC-91AB-746098018D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1F32DDF-17A3-45B5-9227-833EBEBD3923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CDFB7E9-8510-430F-BFBC-FD811D60DC78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D5336A-14AA-483E-9CBE-A7B53120B925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AADA875-E0EA-483A-A07E-2914FE969972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D48A71-B84E-4B6C-9603-B3373052E568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAAB7D55-F155-43F9-A563-F2E35CFFEF26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "72243A3F-6BFD-472B-9EA4-82BE4253ED27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E415CC22-09CA-47D2-9F1A-0BCA8960835B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EF4B938-BB14-4C06-BEE9-10CA755C5DEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "981C922C-7A7D-473E-8C43-03AB62FB5B8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D0CD11A-09C2-4C60-8F0C-68E55BD6EE63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0F40E4A-E125-4099-A8B3-D42614AA9312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4933D9DD-A630-4A3D-9D13-9E182F5F6F8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E6D530-91FC-42F4-A427-6601238E0187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EC938DB-E066-407F-BDF8-61A1C41136F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACDF768D-7F5A-4042-B7DD-398F65F3F094",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF35BB6-C6B1-4683-A8BE-AA72CC34F5B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC3F1891-032D-409C-904C-A415D2323DFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B13826D-06B2-4A46-AB24-092F6935958D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6528FC-51BE-4E30-B282-D9841553BA26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "66CF9452-6225-4726-822B-C7CD620A1D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A953FF53-1106-42D3-BE4A-4F27C7C42F52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D2F015-A38D-43C6-ADC6-A0EFCE150071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "75A8FF8E-A26A-45AD-BD91-9B4822581CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F27C2F9-73BE-46EF-B5ED-8D407D22D12E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB212796-B71B-4F6B-9156-9C5178FF0931",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFBCD79D-3821-4538-B6F1-49F51E5983E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "B66E709F-E34E-4744-8970-0F70F95A8761",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D20691D0-3102-4E82-BED9-9E7B67F9F778",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DA7831F-5F53-4A29-9AB1-913EBD095589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "F798EC96-FC60-47BA-AE27-8C2261D9E5D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "633BEAF3-C73C-48FC-B623-375B9F79C93D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "965BB50E-7675-43A7-B074-98BCB1EBA311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "B52F6124-1C8E-4568-BACF-A463064DA48E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BA2F96C-A676-4F13-8E41-600461338B1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FE5746-FA0B-493A-B3A9-DE2A153C5ECA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7B9B8D2-78B7-4B17-955B-741C7A6F6634",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CA2A940-BD69-4D35-AF12-432CB929248B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29BD13F9-86C8-44C4-A860-9A87870A518E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B361FDE-9F6A-4E9A-96F1-619DC56EECB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBD9E7B-1237-47A8-8A07-5CC5246A9C5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F2BB41E-2096-4291-B0ED-06825FDFE8BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "52BA94F7-1AF9-415C-AC21-30BC25C74C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0A739A0-698A-422B-886B-430A79F6E945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "086E0D24-A43E-4CEA-9FB0-FE193B88CC31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8D0963-8CA5-4814-9B6D-4E1C3907737B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A4B7E0-C872-4E53-AD72-1BB2755E4FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EECCD553-53D5-485E-8C21-E2A5070833B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "95357C79-A754-4E0C-B65B-0FA241962B12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "25EAF9A9-F7A1-4AC7-BCFD-769BE0FDB537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "74EA8037-7C22-48B3-9FA2-4BFFFFD513D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8D1254E-0C72-4958-BA7F-5B818C3ACB15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "92994FFC-F362-48AC-9CA8-8EBCAC880C91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "21131DF1-1EE5-4C84-B1E0-FA75BC39B344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0B23F85D-465B-4176-9798-E78AADE421EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "ADEE52B4-8392-4321-8C00-FABA6270E728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "57D74F58-DB3A-4A70-93CF-B350DB65EF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F6D9B19-E64D-4BED-9194-17460CE19E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F644EA6C-50C6-4A1C-A4AC-287AA9477B46",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA9B3CC0-DF1C-4A86-B2A3-A9D428A5A6E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n openssl_x509_parse en openssl.c en el m\u00f3dulo OpenSSL en PHP anterior a v5.4.18 y v5.5.x anterior v5.5.2 no manejar adecuadamente un car\u00e1cter \u201c\\0\u201d en un nombre de dominio en el campo Subject Alternative Name de un certificado X.509, lo que permite a atacantes \"man-in-the-middle\" suplantar servidores SSL de su elecci\u00f3n mediante un certificado manipulado expedido por una Autoridad Certificadora leg\u00edtima, un problema relacionado con CVE-2009-2408."
    }
  ],
  "id": "CVE-2013-4248",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-08-18T02:52:23.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2874696a5a8d46639d261571f915c493cd875897"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=141390017113542\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1307.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1615.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54478"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54657"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55078"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59652"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT6150"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2013/dsa-2742"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.php.net/ChangeLog-5.php"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/61776"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1028924"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-1937-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2874696a5a8d46639d261571f915c493cd875897"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=141390017113542\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1307.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1615.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54657"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55078"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59652"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT6150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.php.net/ChangeLog-5.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/61776"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1028924"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-1937-1"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…