
CVE-2013-6420 – PHP - 'openssl_x509_parse()' Memory Corruption
https://notcve.org/view.php?id=CVE-2013-6420
11 Dec 2013 — The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function. La función asn1_time_to_time_t en ext / openssl / openssl.c en PHP anterior a 5.3.28, 5.4.x aterior a 5... • https://packetstorm.news/files/id/124436 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-6712 – php: heap-based buffer over-read in DateInterval
https://notcve.org/view.php?id=CVE-2013-6712
28 Nov 2013 — The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification. La función de análisis en ext/date/lib/parse_iso_intervals.c de PHP hasta la versión 5.5.6 no restringe adecuadamente la creación de objetos DateInterval, lo que podría permitir a atacantes remotos provocar una denegación de servicio (desbord... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=12fe4e90be7bfa2a763197079f68f5568a14e071 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVE-2013-1824 – Apple Security Advisory 2013-09-12-1
https://notcve.org/view.php?id=CVE-2013-1824
13 Sep 2013 — The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. El validador SOAP en PHP anterior a 5.3.22 y 5.4.x anterior a 5.4.12 permite a atacantes remotos leer archivos a discrección a través de un archivo SOAP WSDL que contenga una declaración de... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=188c196d4da60bdde9190d2fc532650d17f7af2d • CWE-611: Improper Restriction of XML External Entity Reference •

CVE-2013-4248 – php: hostname check bypassing vulnerability in SSL client
https://notcve.org/view.php?id=CVE-2013-4248
18 Aug 2013 — The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. La función openssl_x509_parse en openssl.c en el módulo OpenSSL en PHP anterior a v5.4.18 y v5.5.x ... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2874696a5a8d46639d261571f915c493cd875897 • CWE-20: Improper Input Validation •

CVE-2011-4718 – Gentoo Linux Security Advisory 201408-11
https://notcve.org/view.php?id=CVE-2011-4718
13 Aug 2013 — Session fixation vulnerability in the Sessions subsystem in PHP before 5.5.2 allows remote attackers to hijack web sessions by specifying a session ID. Vulnerabilidad de fijación de sesión en el subsistema Sessions en PHP anterior a v5.5.2 permite a atacantes remotos secuestrar sesiones web especificando un ID de sesión. Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to remote execution of arbitrary code. Versions less than 5.5.16 are affected. • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=169b78eb79b0e080b67f9798708eb3771c6d0b2f • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-4635 – Gentoo Linux Security Advisory 201408-11
https://notcve.org/view.php?id=CVE-2013-4635
21 Jun 2013 — Integer overflow in the SdnToJewish function in jewish.c in the Calendar component in PHP before 5.3.26 and 5.4.x before 5.4.16 allows context-dependent attackers to cause a denial of service (application hang) via a large argument to the jdtojewish function. Desbordamiento de entero en la función SdnToJewish en jewish.c en el componente Calendar en PHP anterior a v5.3.26 y v5.4.x anterior a v5.4.16 permite a atacantes dependientes del contexto causar una dengación de servicio (cuelgue de la aplicación) med... • http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00034.html • CWE-189: Numeric Errors •

CVE-2013-2110 – Apple Security Advisory 2013-09-12-1
https://notcve.org/view.php?id=CVE-2013-2110
11 Jun 2013 — Heap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function. Desbordamiento de búfer basado en memoria dinámica en la función php_quot_print_encode en ext/standard/quot_print.c en PHP anterior a v5.3.26 y v5.4.x anterior a v5.4.16 permite a atacantes remo... • http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-3735 – Gentoo Linux Security Advisory 201408-11
https://notcve.org/view.php?id=CVE-2013-3735
31 May 2013 — The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers eac... • https://bugs.php.net/bug.php?id=64660 • CWE-20: Improper Input Validation •

CVE-2013-1643 – php: Ability to read arbitrary files due use of external entities while parsing SOAP WSDL files
https://notcve.org/view.php?id=CVE-2013-1643
06 Mar 2013 — The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824. El parser SOAP en PHP v5.3.22 y v5.4.x anterior a v5.4.13 permite a atacantes remotos leer archivos de su elec... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702221 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2013-1635 – Apple Security Advisory 2013-09-12-1
https://notcve.org/view.php?id=CVE-2013-1635
06 Mar 2013 — ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory. ext/soap/soap.c en PHP anterior a v5.3.22 y v5.4.x anterior a v5.4.13 no valida la relacion entre la directiva soap.wsdl_cache_dir y la directiva open_basedir, lo que permite a atacantes remoto... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702221 • CWE-264: Permissions, Privileges, and Access Controls •