First published: Fri May 31 2013(Updated: )
** DISPUTED ** The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <=5.4.15 | |
PHP | =5.4.0 | |
PHP | =5.4.1 | |
PHP | =5.4.2 | |
PHP | =5.4.3 | |
PHP | =5.4.4 | |
PHP | =5.4.5 | |
PHP | =5.4.6 | |
PHP | =5.4.7 | |
PHP | =5.4.8 | |
PHP | =5.4.9 | |
PHP | =5.4.10 | |
PHP | =5.4.11 | |
PHP | =5.4.12 | |
PHP | =5.4.12-rc1 | |
PHP | =5.4.12-rc2 | |
PHP | =5.4.13 | |
PHP | =5.4.13-rc1 | |
PHP | =5.4.14 | |
PHP | =5.4.14-rc1 | |
PHP | <=5.5.0 | |
PHP | =5.5.0-alpha1 | |
PHP | =5.5.0-alpha2 | |
PHP | =5.5.0-alpha3 | |
PHP | =5.5.0-alpha4 | |
PHP | =5.5.0-alpha5 | |
PHP | =5.5.0-alpha6 | |
PHP | =5.5.0-beta1 | |
PHP | =5.5.0-beta2 | |
PHP | =5.5.0-beta3 | |
PHP | =5.5.0-beta4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3735 has a severity rating that indicates the potential for a denial of service, particularly through application crash or memory exhaustion.
To fix CVE-2013-3735, upgrade your PHP version to at least 5.4.16 RC1 or 5.5.0 RC2 to mitigate the vulnerability.
CVE-2013-3735 affects PHP versions prior to 5.4.16 RC1 and 5.5.0 before RC2.
CVE-2013-3735 allows context-dependent attackers to exploit a parser error leading to denial of service conditions.
There are no known workarounds for CVE-2013-3735, and the recommended approach is to upgrade to a non-vulnerable PHP version.