CVE-2013-3735

HIGH

Php < 5.4.15 - Improper Input Validation

Title source: rule
STIX 2.1

Description

The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id.

References (4)

Core 4

Scores

CVSS v3 7.5
EPSS 0.0071
EPSS Percentile 72.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-20
Status published
Products (17)
php/php 5.4.0
php/php 5.4.1
php/php 5.4.2
php/php 5.4.3
php/php 5.4.4
php/php 5.4.5
php/php 5.4.6
php/php 5.4.7
php/php 5.4.8
php/php 5.4.9
... and 7 more
Published May 31, 2013
Tracked Since Feb 18, 2026