Description
The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Thu, 16 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-16T20:30:29.631Z
Reserved: 2013-05-31T00:00:00.000Z
Link: CVE-2013-3735
Updated: 2024-08-06T16:22:01.114Z
Status : Deferred
Published: 2013-05-31T21:55:01.230
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-3735
OpenCVE Enrichment
No data.
Weaknesses