Description
The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id.
References (4)
Core 4
Core References
Exploit, Patch x_refsource_confirm
https://github.com/php/php-src/commit/fb58e69a84f4fde603a630d2c9df2fa3be16d846
Various Sources x_refsource_confirm
https://github.com/php/php-src/blob/php-5.5.0RC2/NEWS
Various Sources x_refsource_confirm
https://github.com/php/php-src/blob/php-5.4.16RC1/NEWS
Various Sources x_refsource_misc
https://bugs.php.net/bug.php?id=64660
Scores
CVSS v3
7.5
EPSS
0.0071
EPSS Percentile
72.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-20
Status
published
Products (17)
php/php
5.4.0
php/php
5.4.1
php/php
5.4.2
php/php
5.4.3
php/php
5.4.4
php/php
5.4.5
php/php
5.4.6
php/php
5.4.7
php/php
5.4.8
php/php
5.4.9
... and 7 more
Published
May 31, 2013
Tracked Since
Feb 18, 2026