CVE-2013-4248Improper Input Validation in PHP

Severity
4.3MEDIUMNVD
EPSS
9.9%
top 6.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 18
Latest updateMay 17

Description

The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

CVSS vector

AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9

Affected Packages1 packages

NVDphp/php5.4.17+78

Also affects: Ubuntu Linux 10.04, 12.04, 12.10, 13.04, Enterprise Linux 5

🔴Vulnerability Details

1
GHSA
GHSA-hhfm-3287-cc2v: The openssl_x509_parse function in openssl2022-05-17

📋Vendor Advisories

2
Ubuntu
PHP vulnerability2013-09-05
Red Hat
php: hostname check bypassing vulnerability in SSL client2013-08-13

💬Community

3
Bugzilla
CVE-2011-4718 CVE-2013-4248 php: various flaws [fedora-all]2013-08-19
Bugzilla
CVE-2013-4248 php: hostname check bypassing vulnerability in SSL client2013-08-14
Bugzilla
CVE-2009-3291 php: openssl extension: Incorrect verification of SSL certificate with NUL in name2009-09-18
CVE-2013-4248 — Improper Input Validation in PHP | cvebase