CVE-2013-4248
Published: 17 August 2013
The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Notes
Author | Note |
---|---|
mdeslaur | initially fixed in 5.5.2 and 5.4.18 regression fixed in 5.5.3 and 5.4.19 |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
lucid |
Released
(5.3.2-1ubuntu4.21)
|
precise |
Released
(5.3.10-1ubuntu3.8)
|
|
quantal |
Released
(5.4.6-1ubuntu1.4)
|
|
raring |
Released
(5.4.9-4ubuntu2.3)
|
|
upstream |
Released
(5.4.19,5.5.3)
|
|
Patches: upstream: http://git.php.net/?p=php-src.git;a=commit;h=dcea4ec698dcae39b7bba6f6aa08933cbfee6755 upstream: http://git.php.net/?p=php-src.git;a=commit;h=c1c49d6e3983c9ce0b43ffe7bf6e03b809ed048b upstream: http://git.php.net/?p=php-src.git;a=commit;h=2874696a5a8d46639d261571f915c493cd875897 upstream: http://git.php.net/?p=php-src.git;a=commit;h=c1c49d6e3983c9ce0b43ffe7bf6e03b809ed048b |