CVE-2013-6420
The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.
Published at
2013-12-17T04:46Z
3645 days ago
Modified
2018-10-30T16:27Z
1866 days ago
CWE-119
Problem type
References
GET https://vulnerabilitydata.com/api/details/CVE-2013-6420
{ "id": "CVE-2013-6420", "published_date": "2013-12-17T04:46Z", "last_modified_date": "2018-10-30T16:27Z", "assigner": "secalert@redhat.com", "description": "The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.", "references": [ { "url": "http://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415", "name": "http://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415", "refsource": "CONFIRM", "tags": [ "Patch" ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036830", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1036830", "refsource": "CONFIRM", "tags": [ "Patch" ] }, { "url": "http://www.php.net/ChangeLog-5.php", "name": "http://www.php.net/ChangeLog-5.php", "refsource": "CONFIRM", "tags": [] }, { "url": "https://www.sektioneins.de/advisories/advisory-012013-php-openssl_x509_parse-memory-corruption-vulnerability.html", "name": "https://www.sektioneins.de/advisories/advisory-012013-php-openssl_x509_parse-memory-corruption-vulnerability.html", "refsource": "MISC", "tags": [ "Exploit" ] }, { "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html", "name": "openSUSE-SU-2013:1963", "refsource": "SUSE", "tags": [] }, { "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html", "name": "openSUSE-SU-2013:1964", "refsource": "SUSE", "tags": [] }, { "url": "http://www.securitytracker.com/id/1029472", "name": "1029472", "refsource": "SECTRACK", "tags": [] }, { "url": "http://support.apple.com/kb/HT6150", "name": "http://support.apple.com/kb/HT6150", "refsource": "CONFIRM", "tags": [] }, { "url": "http://secunia.com/advisories/59652", "name": "59652", "refsource": "SECUNIA", "tags": [] }, { "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322", "name": "HPSBMU03112", "refsource": "HP", "tags": [] }, { "url": "http://www.securityfocus.com/bid/64225", "name": "64225", "refsource": "BID", "tags": [] }, { "url": "http://www.ubuntu.com/usn/USN-2055-1", "name": "USN-2055-1", "refsource": "UBUNTU", "tags": [] }, { "url": "http://www.debian.org/security/2013/dsa-2816", "name": "DSA-2816", "refsource": "DEBIAN", "tags": [] }, { "url": "http://rhn.redhat.com/errata/RHSA-2013-1826.html", "name": "RHSA-2013:1826", "refsource": "REDHAT", "tags": [] }, { "url": "http://rhn.redhat.com/errata/RHSA-2013-1825.html", "name": "RHSA-2013:1825", "refsource": "REDHAT", "tags": [] }, { "url": "http://rhn.redhat.com/errata/RHSA-2013-1824.html", "name": "RHSA-2013:1824", "refsource": "REDHAT", "tags": [] }, { "url": "http://rhn.redhat.com/errata/RHSA-2013-1815.html", "name": "RHSA-2013:1815", "refsource": "REDHAT", "tags": [] }, { "url": "http://rhn.redhat.com/errata/RHSA-2013-1813.html", "name": "RHSA-2013:1813", "refsource": "REDHAT", "tags": [] }, { "url": "http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel!", "name": "http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel!", "refsource": "CONFIRM", "tags": [] } ], "impact": { "baseMetricV2": { "cvssV2": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "severity": "HIGH", "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } }, "problem_type": "CWE-119" }