SB2013071301 - Buffer overflow in PHP
Published: July 13, 2013 Updated: July 28, 2020
Security Bulletin ID
SB2013071301
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Data manipulation
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2013-4113)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.
Remediation
Install update from vendor's website.
References
- http://git.php.net/?p=php-src.git;a=commit;h=7d163e8a0880ae8af2dd869071393e5dc07ef271
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00007.html
- http://php.net/archive/2013.php#id2013-07-11-1
- http://php.net/ChangeLog-5.php
- http://rhn.redhat.com/errata/RHSA-2013-1049.html
- http://rhn.redhat.com/errata/RHSA-2013-1050.html
- http://rhn.redhat.com/errata/RHSA-2013-1061.html
- http://rhn.redhat.com/errata/RHSA-2013-1062.html
- http://rhn.redhat.com/errata/RHSA-2013-1063.html
- http://secunia.com/advisories/54071
- http://secunia.com/advisories/54104
- http://secunia.com/advisories/54163
- http://secunia.com/advisories/54165
- http://support.apple.com/kb/HT6150
- http://www.debian.org/security/2013/dsa-2723
- http://www.ubuntu.com/usn/USN-1905-1
- https://bugs.php.net/bug.php?id=65236
- https://bugzilla.redhat.com/show_bug.cgi?id=983689