SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   PHP Vendors:   PHP Group
PHP OpenSSL subjectAltName Null Byte Processing Flaw Lets Remote Users Spoof SSL Servers
SecurityTracker Alert ID:  1028924
SecurityTracker URL:  http://securitytracker.com/id/1028924
CVE Reference:   CVE-2013-4248   (Links to External Site)
Date:  Aug 19 2013
Impact:   Modification of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to versions 5.4.18 and 5.5.2
Description:   A vulnerability was reported in PHP. A remote user can conduct certificate spoofing attacks.

The PHP OpenSSL module does not properly handle '\0' characters in a domain name in the Subject Alternative Name field. A remote user that can create a specially crafted certificate signed by a valid Certificate Authority can spoof arbitrary SSL servers.

The openssl_x509_parse() function in 'openssl.c' is affected.

Impact:   A remote user can conduct certificate spoofing attacks.
Solution:   The vendor has issued a fix (5.4.18, 5.5.2).

The vendor's advisory is available at:

http://www.php.net/ChangeLog-5.php#5.5.2

Vendor URL:  www.php.net/ChangeLog-5.php#5.5.2 (Links to External Site)
Cause:   Authentication error
Underlying OS:   Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 1 2013 (Red Hat Issues Fix) PHP OpenSSL subjectAltName Null Byte Processing Flaw Lets Remote Users Spoof SSL Servers   (bugzilla@redhat.com)
Red Hat has issued a fix for Red Hat Enterprise Linux 5.
Apr 3 2014 (Oracle Issues Fix for Solaris) PHP OpenSSL subjectAltName Null Byte Processing Flaw Lets Remote Users Spoof SSL Servers
Oracle has issued a fix for Solaris 11.1.



 Source Message Contents

Date:  Mon, 19 Aug 2013 15:16:50 +0000
Subject:  PHP


http://www.php.net/ChangeLog-5.php#5.5.2

Openssl:

    Fixed handling null bytes in subjectAltName (CVE-2013-4248).

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC