Your submission was sent successfully! Close

CVE-2013-4248

Published: 17 August 2013

The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Notes

AuthorNote
mdeslaur
initially fixed in 5.5.2 and 5.4.18
regression fixed in 5.5.3 and 5.4.19
Priority

Medium

Status

Package Release Status
php5
Launchpad, Ubuntu, Debian
lucid
Released (5.3.2-1ubuntu4.21)
precise
Released (5.3.10-1ubuntu3.8)
quantal
Released (5.4.6-1ubuntu1.4)
raring
Released (5.4.9-4ubuntu2.3)
upstream
Released (5.4.19,5.5.3)
Patches:
upstream: http://git.php.net/?p=php-src.git;a=commit;h=dcea4ec698dcae39b7bba6f6aa08933cbfee6755 (5.3)
upstream: http://git.php.net/?p=php-src.git;a=commit;h=c1c49d6e3983c9ce0b43ffe7bf6e03b809ed048b (5.3)
upstream: http://git.php.net/?p=php-src.git;a=commit;h=2874696a5a8d46639d261571f915c493cd875897 (5.4+)
upstream: http://git.php.net/?p=php-src.git;a=commit;h=c1c49d6e3983c9ce0b43ffe7bf6e03b809ed048b (5.4+)