Lucene search

K
ubuntucveUbuntu.comUB:CVE-2013-4248
HistoryAug 17, 2013 - 12:00 a.m.

CVE-2013-4248

2013-08-1700:00:00
ubuntu.com
ubuntu.com
10

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

0.029 Low

EPSS

Percentile

90.9%

The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP
before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a ‘\0’
character in a domain name in the Subject Alternative Name field of an
X.509 certificate, which allows man-in-the-middle attackers to spoof
arbitrary SSL servers via a crafted certificate issued by a legitimate
Certification Authority, a related issue to CVE-2009-2408.

Bugs

Notes

Author Note
mdeslaur initially fixed in 5.5.2 and 5.4.18 regression fixed in 5.5.3 and 5.4.19
OSVersionArchitecturePackageVersionFilename
ubuntu10.04noarchphp5< 5.3.2-1ubuntu4.21UNKNOWN
ubuntu12.04noarchphp5< 5.3.10-1ubuntu3.8UNKNOWN
ubuntu12.10noarchphp5< 5.4.6-1ubuntu1.4UNKNOWN
ubuntu13.04noarchphp5< 5.4.9-4ubuntu2.3UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

0.029 Low

EPSS

Percentile

90.9%