The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 16 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-16T20:30:29.631Z
Reserved: 2013-05-31T00:00:00Z
Link: CVE-2013-3735
Updated: 2024-08-06T16:22:01.114Z
Status : Deferred
Published: 2013-05-31T21:55:01.230
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-3735
OpenCVE Enrichment
No data.
Weaknesses