Vulnerability Details : CVE-2013-4113
ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2013-4113
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Threat overview for CVE-2013-4113
Top countries where our scanners detected CVE-2013-4113
Top open port discovered on systems with this issue
80
IPs affected by CVE-2013-4113 192,486
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2013-4113!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2013-4113
61.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-4113
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2013-4113
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-4113
-
http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00007.html
[security-announce] SUSE-SU-2013:1316-1: important: Security update forMailing List;Third Party Advisory
-
http://git.php.net/?p=php-src.git;a=commit;h=7d163e8a0880ae8af2dd869071393e5dc07ef271
208.43.231.11 Git - php-src.git/commitPatch;Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1061.html
RHSA-2013:1061 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://php.net/archive/2013.php#id2013-07-11-1
PHP: News Archive - 2013Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=983689
983689 – (CVE-2013-4113) CVE-2013-4113 php: xml_parse_into_struct buffer overflow when parsing deeply nested XMLIssue Tracking
-
http://www.ubuntu.com/usn/USN-1905-1
USN-1905-1: PHP vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1050.html
RHSA-2013:1050 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1049.html
RHSA-2013:1049 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1062.html
RHSA-2013:1062 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://bugs.php.net/bug.php?id=65236
PHP :: Sec Bug #65236 :: heap corruption in xml parserVendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1063.html
RHSA-2013:1063 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html
[security-announce] SUSE-SU-2013:1315-1: important: Security update forMailing List;Third Party Advisory
-
http://www.debian.org/security/2013/dsa-2723
Debian -- Security Information -- DSA-2723-1 php5Third Party Advisory
-
http://support.apple.com/kb/HT6150
About the security content of OS X Mavericks v10.9.2 and Security Update 2014-001 - Apple SupportThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00034.html
[security-announce] SUSE-SU-2013:1285-1: important: Security update forMailing List;Third Party Advisory
-
http://php.net/ChangeLog-5.php
PHP: PHP 5 ChangeLogVendor Advisory
Jump to