CVE-2013-6420

The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.

Published at
2013-12-17T04:46Z
3786 days ago
Modified
2018-10-30T16:27Z
2007 days ago
CWE-119
Problem type

References


URLType
git.php.net
http://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415
CONFIRM
bugzilla.redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1036830
CONFIRM
www.php.net
http://www.php.net/ChangeLog-5.php
CONFIRM
www.sektioneins.de
https://www.sektioneins.de/advisories/advisory-012013-php-openssl_x509_parse-memory-corruption-vulnerability.html
MISC
openSUSE-SU-2013:1963
http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html
SUSE
openSUSE-SU-2013:1964
http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html
SUSE
1029472
http://www.securitytracker.com/id/1029472
SECTRACK
support.apple.com
http://support.apple.com/kb/HT6150
CONFIRM
59652
http://secunia.com/advisories/59652
SECUNIA
HPSBMU03112
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322
HP
64225
http://www.securityfocus.com/bid/64225
BID
USN-2055-1
http://www.ubuntu.com/usn/USN-2055-1
UBUNTU
DSA-2816
http://www.debian.org/security/2013/dsa-2816
DEBIAN
RHSA-2013:1826
http://rhn.redhat.com/errata/RHSA-2013-1826.html
REDHAT
RHSA-2013:1825
http://rhn.redhat.com/errata/RHSA-2013-1825.html
REDHAT
RHSA-2013:1824
http://rhn.redhat.com/errata/RHSA-2013-1824.html
REDHAT
RHSA-2013:1815
http://rhn.redhat.com/errata/RHSA-2013-1815.html
REDHAT
RHSA-2013:1813
http://rhn.redhat.com/errata/RHSA-2013-1813.html
REDHAT
forums.interworx.com
http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel!
CONFIRM

GET https://vulnerabilitydata.com/api/details/CVE-2013-6420

{
	"id": "CVE-2013-6420",
	"published_date": "2013-12-17T04:46Z",
	"last_modified_date": "2018-10-30T16:27Z",
	"assigner": "secalert@redhat.com",
	"description": "The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.",
	"references": [
		{
			"url": "http://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415",
			"name": "http://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415",
			"refsource": "CONFIRM",
			"tags": [
				"Patch"
			]
		},
		{
			"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036830",
			"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1036830",
			"refsource": "CONFIRM",
			"tags": [
				"Patch"
			]
		},
		{
			"url": "http://www.php.net/ChangeLog-5.php",
			"name": "http://www.php.net/ChangeLog-5.php",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://www.sektioneins.de/advisories/advisory-012013-php-openssl_x509_parse-memory-corruption-vulnerability.html",
			"name": "https://www.sektioneins.de/advisories/advisory-012013-php-openssl_x509_parse-memory-corruption-vulnerability.html",
			"refsource": "MISC",
			"tags": [
				"Exploit"
			]
		},
		{
			"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html",
			"name": "openSUSE-SU-2013:1963",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html",
			"name": "openSUSE-SU-2013:1964",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://www.securitytracker.com/id/1029472",
			"name": "1029472",
			"refsource": "SECTRACK",
			"tags": []
		},
		{
			"url": "http://support.apple.com/kb/HT6150",
			"name": "http://support.apple.com/kb/HT6150",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://secunia.com/advisories/59652",
			"name": "59652",
			"refsource": "SECUNIA",
			"tags": []
		},
		{
			"url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322",
			"name": "HPSBMU03112",
			"refsource": "HP",
			"tags": []
		},
		{
			"url": "http://www.securityfocus.com/bid/64225",
			"name": "64225",
			"refsource": "BID",
			"tags": []
		},
		{
			"url": "http://www.ubuntu.com/usn/USN-2055-1",
			"name": "USN-2055-1",
			"refsource": "UBUNTU",
			"tags": []
		},
		{
			"url": "http://www.debian.org/security/2013/dsa-2816",
			"name": "DSA-2816",
			"refsource": "DEBIAN",
			"tags": []
		},
		{
			"url": "http://rhn.redhat.com/errata/RHSA-2013-1826.html",
			"name": "RHSA-2013:1826",
			"refsource": "REDHAT",
			"tags": []
		},
		{
			"url": "http://rhn.redhat.com/errata/RHSA-2013-1825.html",
			"name": "RHSA-2013:1825",
			"refsource": "REDHAT",
			"tags": []
		},
		{
			"url": "http://rhn.redhat.com/errata/RHSA-2013-1824.html",
			"name": "RHSA-2013:1824",
			"refsource": "REDHAT",
			"tags": []
		},
		{
			"url": "http://rhn.redhat.com/errata/RHSA-2013-1815.html",
			"name": "RHSA-2013:1815",
			"refsource": "REDHAT",
			"tags": []
		},
		{
			"url": "http://rhn.redhat.com/errata/RHSA-2013-1813.html",
			"name": "RHSA-2013:1813",
			"refsource": "REDHAT",
			"tags": []
		},
		{
			"url": "http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel!",
			"name": "http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel!",
			"refsource": "CONFIRM",
			"tags": []
		}
	],
	"impact": {
		"baseMetricV2": {
			"cvssV2": {
				"version": "2.0",
				"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
				"accessVector": "NETWORK",
				"accessComplexity": "LOW",
				"authentication": "NONE",
				"confidentialityImpact": "PARTIAL",
				"integrityImpact": "PARTIAL",
				"availabilityImpact": "PARTIAL",
				"baseScore": 7.5
			},
			"severity": "HIGH",
			"exploitabilityScore": 10,
			"impactScore": 6.4,
			"obtainAllPrivilege": false,
			"obtainUserPrivilege": false,
			"obtainOtherPrivilege": false,
			"userInteractionRequired": false
		}
	},
	"problem_type": "CWE-119"
}