First published: Thu Nov 28 2013(Updated: )
The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <5.3.29 | |
PHP | >=5.4.0<5.4.24 | |
PHP | >=5.5.0<5.5.8 | |
Apple iOS and macOS | <=10.10.2 | |
openSUSE | =11.4 | |
openSUSE | =12.2 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Ubuntu | =13.10 | |
Debian Linux | =6.0 | |
Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6712 is classified as a moderate severity vulnerability due to its potential to cause denial of service through heap-based buffer over-read.
To remediate CVE-2013-6712, you should upgrade PHP to version 5.5.6 or later, or to any version above the affected versions in the 5.4.x and 5.3.x series.
CVE-2013-6712 affects PHP versions prior to 5.5.6 as well as specific versions within the 5.4.x and 5.3.x series.
Yes, CVE-2013-6712 can be exploited remotely by attackers using crafted interval specifications.
The impact of CVE-2013-6712 is a potential denial of service condition that could lead to application crashes due to memory issues.