ID

VAR-201312-0207


CVE

CVE-2013-6420


TITLE

PHP ‘ asn1_time_to_time_t 'Function Memory Corruption Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201312-348

DESCRIPTION

The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function. PHP is prone to a remote memory-corruption vulnerability. Attackers can exploit this issue to run arbitrary code within the context of the PHP process. Failed exploit attempts may result in a denial-of-service condition. PHP (PHP: Hypertext Preprocessor, PHP: Hypertext Preprocessor) is an open source general-purpose computer scripting language jointly maintained by the PHP Group and the open source community. The language is mainly used for Web development and supports a variety of databases and operating systems. The vulnerability is caused by the openssl_x509_parse() function not correctly parsing the notBefore and notAfter timestamps in the X.509 certificate. The following versions are affected: PHP prior to 5.3.28, 5.4.x prior to 5.4.23, 5.5.x prior to 5.5.7. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201408-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: PHP: Multiple vulnerabilities Date: August 29, 2014 Bugs: #459904, #472204, #472558, #474656, #476570, #481004, #483212, #485252, #492784, #493982, #501312, #503630, #503670, #505172, #505712, #509132, #512288, #512492, #513032, #516994, #519932, #520134, #520438 ID: 201408-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to remote execution of arbitrary code. Background ========== PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-lang/php < 5.5.16 >= 5.5.16 *>= 5.4.32 *>= 5.3.29 Description =========== Multiple vulnerabilities have been discovered in PHP. Please review the CVE identifiers referenced below for details. Impact ====== A context-dependent attacker can cause arbitrary code execution, create a Denial of Service condition, read or write arbitrary files, impersonate other servers, hijack a web session, or have other unspecified impact. Additionally, a local attacker could gain escalated privileges. Workaround ========== There is no known workaround at this time. Resolution ========== All PHP 5.5 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/php-5.5.16" All PHP 5.4 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/php-5.4.32" All PHP 5.3 users should upgrade to the latest version. This release marks the end of life of the PHP 5.3 series. Future releases of this series are not planned. All PHP 5.3 users are encouraged to upgrade to the current stable version of PHP 5.5 or previous stable version of PHP 5.4, which are supported till at least 2016 and 2015 respectively. # emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/php-5.3.29" References ========== [ 1 ] CVE-2011-4718 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4718 [ 2 ] CVE-2013-1635 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1635 [ 3 ] CVE-2013-1643 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1643 [ 4 ] CVE-2013-1824 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1824 [ 5 ] CVE-2013-2110 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2110 [ 6 ] CVE-2013-3735 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3735 [ 7 ] CVE-2013-4113 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4113 [ 8 ] CVE-2013-4248 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4248 [ 9 ] CVE-2013-4635 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4635 [ 10 ] CVE-2013-4636 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4636 [ 11 ] CVE-2013-6420 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6420 [ 12 ] CVE-2013-6712 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6712 [ 13 ] CVE-2013-7226 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7226 [ 14 ] CVE-2013-7327 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7327 [ 15 ] CVE-2013-7345 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345 [ 16 ] CVE-2014-0185 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0185 [ 17 ] CVE-2014-0237 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0237 [ 18 ] CVE-2014-0238 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0238 [ 19 ] CVE-2014-1943 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943 [ 20 ] CVE-2014-2270 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270 [ 21 ] CVE-2014-2497 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2497 [ 22 ] CVE-2014-3597 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3597 [ 23 ] CVE-2014-3981 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3981 [ 24 ] CVE-2014-4049 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4049 [ 25 ] CVE-2014-4670 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4670 [ 26 ] CVE-2014-5120 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5120 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201408-11.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2014:014 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : php Date : January 21, 2014 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been discovered and corrected in php: The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a &#039;\0&#039; character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408 (CVE-2013-4248). Additionally, the PECL packages which requires so has been rebuilt for php-5.5.8 and some has been upgraded to their latest versions. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. ============================================================================ Ubuntu Security Notice USN-2055-1 December 12, 2013 php5 vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.10 - Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: Several security issues were fixed in PHP. (CVE-2013-6420) It was discovered that PHP incorrectly handled DateInterval objects. (CVE-2013-6712) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.10: libapache2-mod-php5 5.5.3+dfsg-1ubuntu2.1 php5-cgi 5.5.3+dfsg-1ubuntu2.1 php5-cli 5.5.3+dfsg-1ubuntu2.1 Ubuntu 13.04: libapache2-mod-php5 5.4.9-4ubuntu2.4 php5-cgi 5.4.9-4ubuntu2.4 php5-cli 5.4.9-4ubuntu2.4 Ubuntu 12.10: libapache2-mod-php5 5.4.6-1ubuntu1.5 php5-cgi 5.4.6-1ubuntu1.5 php5-cli 5.4.6-1ubuntu1.5 Ubuntu 12.04 LTS: libapache2-mod-php5 5.3.10-1ubuntu3.9 php5-cgi 5.3.10-1ubuntu3.9 php5-cli 5.3.10-1ubuntu3.9 Ubuntu 10.04 LTS: libapache2-mod-php5 5.3.2-1ubuntu4.22 php5-cgi 5.3.2-1ubuntu4.22 php5-cli 5.3.2-1ubuntu4.22 In general, a standard system update will make all the necessary changes. Release Date: 2014-09-30 Last Updated: 2014-09-30 Potential Security Impact: Cross-site scripting (XSS), Cross-site Request Forgery (CSRF), unauthorized disclosure of information, Denial of Service (DoS), and Clickjacking Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) on Linux and Windows. The vulnerabilities could be exploited remotely resulting in Cross-site Scripting (XSS), Cross-site Request Forgery (CSRF), unauthorized disclosure of information, Denial of Service (DoS), and Clickjacking. References: CVE-2013-4545 Unauthorized modification CVE-2013-6420 (SSRT101447) Unauthorized disclosure of information CVE-2013-6422 Unauthorized disclosure of information CVE-2013-6712 (SSRT101447) Denial of Service (DoS) CVE-2014-2640 (SSRT101633, SSRT101438) Cross-site Scripting (XSS) CVE-2014-2641 (SSRT101438) Cross-site Request Forgery (CSRF) CVE-2014-2642 (SSRT101701) Clickjacking SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP System Management Homepage (SMH) for Linux and Windows prior to version 7.4 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2013-4545 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2013-6420 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2013-6422 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0 CVE-2013-6712 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2014-2640 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2014-2641 (AV:N/AC:M/Au:S/C:P/I:P/A:P) 6.0 CVE-2014-2642 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has made the following software updates available to resolve the vulnerabilities for the impacted versions of HP System Management Homepage (SMH) for Linux and Windows: http://h18013.www1.hp.com/products/servers/management/agents/ HISTORY Version:1 (rev.1) - 30 September 2014 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/php-5.4.24-i486-1_slack14.1.txz: Upgraded. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.4.24-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.4.24-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/php-5.4.24-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/php-5.4.24-x86_64-1_slack14.1.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.4.24-i486-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.4.24-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.0 package: 1c864df50286602ccb2d3efbabb9d7ec php-5.4.24-i486-1_slack14.0.txz Slackware x86_64 14.0 package: cc0f365855b83708c82a84ea44a4ad21 php-5.4.24-x86_64-1_slack14.0.txz Slackware 14.1 package: 1091912280ef2fbe271da2aa304dba36 php-5.4.24-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 22b91ef0428a15b3124c5b4fb911b1bc php-5.4.24-x86_64-1_slack14.1.txz Slackware -current package: f306c21609d14c7380295d63054d8f46 n/php-5.4.24-i486-1.txz Slackware x86_64 -current package: 3cb4ff4fdaba44aa5ed3a946adbe9c9f n/php-5.4.24-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg php-5.4.24-i486-1_slack14.1.txz Then, restart Apache httpd: # /etc/rc.d/rc.httpd stop # /etc/rc.d/rc.httpd start +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-02-25-1 OS X Mavericks 10.9.2 and Security Update 2014-001 OS X Mavericks 10.9.2 and Security Update 2014-001 is now available and addresses the following: Apache Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Multiple vulnerabilities in Apache Description: Multiple vulnerabilities existed in Apache, the most serious of which may lead to cross-site scripting. These issues were addressed by updating Apache to version 2.2.26. CVE-ID CVE-2013-1862 CVE-2013-1896 App Sandbox Available for: OS X Mountain Lion v10.8.5 Impact: The App Sandbox may be bypassed Description: The LaunchServices interface for launching an application allowed sandboxed apps to specify the list of arguments passed to the new process. A compromised sandboxed application could abuse this to bypass the sandbox. This issue was addressed by preventing sandboxed applications from specifying arguments. This issue does not affect systems running OS X Mavericks 10.9 or later. CVE-ID CVE-2013-5179 : Friedrich Graeter of The Soulmen GbR ATS Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution Description: A memory corruption issue existed in the handling of handling of Type 1 fonts. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1254 : Felix Groebert of the Google Security Team ATS Available for: OS X Mavericks 10.9 and 10.9.1 Impact: The App Sandbox may be bypassed Description: A memory corruption issue existed in the handling of Mach messages passed to ATS. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1262 : Meder Kydyraliev of the Google Security Team ATS Available for: OS X Mavericks 10.9 and 10.9.1 Impact: The App Sandbox may be bypassed Description: An arbitrary free issue existed in the handling of Mach messages passed to ATS. This issue was addressed through additional validation of Mach messages. CVE-ID CVE-2014-1255 : Meder Kydyraliev of the Google Security Team ATS Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: The App Sandbox may be bypassed Description: A buffer overflow issue existed in the handling of Mach messages passed to ATS. This issue was addressed by additional bounds checking. CVE-ID CVE-2014-1256 : Meder Kydyraliev of the Google Security Team Certificate Trust Policy Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Root certificates have been updated Description: The set of system root certificates has been updated. The complete list of recognized system roots may be viewed via the Keychain Access application. CFNetwork Cookies Available for: OS X Mountain Lion v10.8.5 Impact: Session cookies may persist even after resetting Safari Description: Resetting Safari did not always delete session cookies until Safari was closed. This issue was addressed through improved handling of session cookies. This issue does not affect systems running OS X Mavericks 10.9 or later. CVE-ID CVE-2014-1257 : Rob Ansaldo of Amherst College, Graham Bennett CoreAnimation Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Visiting a maliciously crafted site may lead to an unexpected application termination or arbitrary code execution Description: A heap buffer overflow existed in CoreAnimation's handling of images. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1258 : Karl Smith of NCC Group CoreText Available for: OS X Mavericks 10.9 and 10.9.1 Impact: Applications that use CoreText may be vulnerable to an unexpected application termination or arbitrary code execution Description: A signedness issue existed in CoreText in the handling of Unicode fonts. This issue is addressed through improved bounds checking. CVE-ID CVE-2014-1261 : Lucas Apa and Carlos Mario Penagos of IOActive Labs curl Available for: OS X Mavericks 10.9 and 10.9.1 Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: When using curl to connect to an HTTPS URL containing an IP address, the IP address was not validated against the certificate. This issue does not affect systems prior to OS X Mavericks v10.9. CVE-ID CVE-2014-1263 : Roland Moriz of Moriz GmbH Data Security Available for: OS X Mavericks 10.9 and 10.9.1 Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS Description: Secure Transport failed to validate the authenticity of the connection. This issue was addressed by restoring missing validation steps. CVE-ID CVE-2014-1266 Date and Time Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: An unprivileged user may change the system clock Description: This update changes the behavior of the systemsetup command to require administrator privileges to change the system clock. CVE-ID CVE-2014-1265 File Bookmark Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing a file with a maliciously crafted name may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of file names. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1259 Finder Available for: OS X Mavericks 10.9 and 10.9.1 Impact: Accessing a file's ACL via Finder may lead to other users gaining unauthorized access to files Description: Accessing a file's ACL via Finder may corrupt the ACLs on the file. This issue was addressed through improved handling of ACLs. CVE-ID CVE-2014-1264 ImageIO Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing a maliciously crafted JPEG file may lead to the disclosure of memory contents Description: An uninitialized memory access issue existed in libjpeg's handling of JPEG markers, resulting in the disclosure of memory contents. This issue was addressed by better JPEG handling. CVE-ID CVE-2013-6629 : Michal Zalewski IOSerialFamily Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5 Impact: Executing a malicious application may result in arbitrary code execution within the kernel Description: An out of bounds array access existed in the IOSerialFamily driver. This issue was addressed through additional bounds checking. This issue does not affect systems running OS X Mavericks v10.9 or later. CVE-ID CVE-2013-5139 : @dent1zt LaunchServices Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5 Impact: A file could show the wrong extension Description: An issue existed in the handling of certain unicode characters that could allow filenames to show incorrect extensions. The issue was addressed by filtering unsafe unicode characters from display in filenames. This issue does not affect systems running OS X Mavericks v10.9 or later. CVE-ID CVE-2013-5178 : Jesse Ruderman of Mozilla Corporation, Stephane Sudre of Intego NVIDIA Drivers Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Executing a malicious application could result in arbitrary code execution within the graphics card Description: An issue existed that allowed writes to some trusted memory on the graphics card. This issue was addressed by removing the ability of the host to write to that memory. CVE-ID CVE-2013-5986 : Marcin Kościelnicki from the X.Org Foundation Nouveau project CVE-2013-5987 : Marcin Kościelnicki from the X.Org Foundation Nouveau project PHP Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP, the most serious of which may have led to arbitrary code execution. These issues were addressed by updating PHP to version 5.4.22 on OS X Mavericks v10.9, and 5.3.28 on OS X Lion and Mountain Lion. CVE-ID CVE-2013-4073 CVE-2013-4113 CVE-2013-4248 CVE-2013-6420 QuickLook Available for: OS X Mountain Lion v10.8.5 Impact: Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in QuickLook's handling of Microsoft Office files. Downloading a maliciously crafted Microsoft Office file may have led to an unexpected application termination or arbitrary code execution. This issue does not affect systems running OS X Mavericks 10.9 or later. CVE-ID CVE-2014-1260 : Felix Groebert of the Google Security Team QuickLook Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Downloading a maliciously crafted Microsoft Word document may lead to an unexpected application termination or arbitrary code execution Description: A double free issue existed in QuickLook's handling of Microsoft Word documents. This issue was addressed through improved memory management. CVE-ID CVE-2014-1252 : Felix Groebert of the Google Security Team QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of 'ftab' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1246 : An anonymous researcher working with HP's Zero Day Initiative QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of 'dref' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1247 : Tom Gallagher & Paul Bates working with HP's Zero Day Initiative QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of 'ldat' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1248 : Jason Kratzer working with iDefense VCP QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing a maliciously crafted PSD image may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of PSD images. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1249 : dragonltx of Tencent Security Team QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An out of bounds byte swapping issue existed in the handling of 'ttfo' elements. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1250 : Jason Kratzer working with iDefense VCP QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A signedness issue existed in the handling of 'stsz' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1245 : Tom Gallagher & Paul Bates working with HP's Zero Day Initiative Secure Transport Available for: OS X Mountain Lion v10.8.5 Impact: An attacker may be able to decrypt data protected by SSL Description: There were known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite used a block cipher in CBC mode. To address these issues for applications using Secure Transport, the 1-byte fragment mitigation was enabled by default for this configuration. CVE-ID CVE-2011-3389 : Juliano Rizzo and Thai Duong OS X Mavericks v10.9.2 includes the content of Safari 7.0.2. OS X Mavericks v10.9.2 and Security Update 2014-001 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJTDNeoAAoJEPefwLHPlZEwaRAP/3i/2qRvNv6JqmE9p48uEyXn mlxwXpMyop+vrgMmuiSP14EGSv06HO04PNUtaWPxm7tVYXu0tMtjDcYdIu40TAy6 U0T6QhRZC/uag1DCvdEOvqRUajKmmPtHTCJ6OsQGtGJHlEM+S5XgxRr7qgfkHMfb OlqFsgpdL/AAiYNfzItN2C+r2Lfwro6LDlxhikpASojlMFQrk8nJ6irRv617anSZ 3DwJW2iJxNfpVrgqA1Nrx1fkrPmeT/8jgGuEP6RaKiWIbfXjRG5BW9WuarMqmaP8 C6XoTaJaqEO9zb7F2uJR0HIYpJd065y/xiYNm91yDWIjdrO3wVgNVPGo1pHVyYsY Y7lcyHUVJortKF8SHquw0j3Ujeugu8iWp6ND/00/4dGvwb0jzrxPUxkEmJ43130O t2Obtxdsaa+ub8cZHDN93WB3FQR5hd+KaeXLJC55q0qYY8o8zqdPqXAlYAP2gUQX iB4Bs7NAh2CNJWNTtk2soTjZOwPvPLSPZ6I3w5i0HVP7HQl5K8chjihAwSeyezCZ q5gxCiK0lBW88AUd9n3L7ZOW2Rg53mh6+RiUL/VQ7TfidoP417VDKum300pZkgNv kBCklX9ya7QeLjOMnbnsTk32qG+TiDPgiGZ5IrK6C6T26dexJWbm8tuwPjy5r8mI aiYIh+SzR0rBdMZRgyzv =+DAJ -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: php security update Advisory ID: RHSA-2013:1814-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-1814.html Issue date: 2013-12-11 CVE Names: CVE-2011-1398 CVE-2012-2688 CVE-2013-1643 CVE-2013-6420 ===================================================================== 1. Summary: Updated php packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. (CVE-2013-6420) It was found that PHP did not check for carriage returns in HTTP headers, allowing intended HTTP response splitting protections to be bypassed. Depending on the web browser the victim is using, a remote attacker could use this flaw to perform HTTP response splitting attacks. (CVE-2011-1398) An integer signedness issue, leading to a heap-based buffer underflow, was found in the PHP scandir() function. (CVE-2012-2688) It was found that the PHP SOAP parser allowed the expansion of external XML entities during SOAP message parsing. A remote attacker could possibly use this flaw to read arbitrary files that are accessible to a PHP application using a SOAP extension. (CVE-2013-1643) Red Hat would like to thank the PHP project for reporting CVE-2013-6420. Upstream acknowledges Stefan Esser as the original reporter. All php users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 828051 - CVE-2012-2688 php: Integer Signedness issues in _php_stream_scandir 853329 - CVE-2011-1398 PHP: sapi_header_op() %0D sequence handling security bypass 918187 - CVE-2013-1643 php: Ability to read arbitrary files due use of external entities while parsing SOAP WSDL files 1036830 - CVE-2013-6420 php: memory corruption in openssl_x509_parse() 6. Package List: RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/php-5.1.6-43.el5_10.src.rpm i386: php-5.1.6-43.el5_10.i386.rpm php-bcmath-5.1.6-43.el5_10.i386.rpm php-cli-5.1.6-43.el5_10.i386.rpm php-common-5.1.6-43.el5_10.i386.rpm php-dba-5.1.6-43.el5_10.i386.rpm php-debuginfo-5.1.6-43.el5_10.i386.rpm php-devel-5.1.6-43.el5_10.i386.rpm php-gd-5.1.6-43.el5_10.i386.rpm php-imap-5.1.6-43.el5_10.i386.rpm php-ldap-5.1.6-43.el5_10.i386.rpm php-mbstring-5.1.6-43.el5_10.i386.rpm php-mysql-5.1.6-43.el5_10.i386.rpm php-ncurses-5.1.6-43.el5_10.i386.rpm php-odbc-5.1.6-43.el5_10.i386.rpm php-pdo-5.1.6-43.el5_10.i386.rpm php-pgsql-5.1.6-43.el5_10.i386.rpm php-snmp-5.1.6-43.el5_10.i386.rpm php-soap-5.1.6-43.el5_10.i386.rpm php-xml-5.1.6-43.el5_10.i386.rpm php-xmlrpc-5.1.6-43.el5_10.i386.rpm x86_64: php-5.1.6-43.el5_10.x86_64.rpm php-bcmath-5.1.6-43.el5_10.x86_64.rpm php-cli-5.1.6-43.el5_10.x86_64.rpm php-common-5.1.6-43.el5_10.x86_64.rpm php-dba-5.1.6-43.el5_10.x86_64.rpm php-debuginfo-5.1.6-43.el5_10.x86_64.rpm php-devel-5.1.6-43.el5_10.x86_64.rpm php-gd-5.1.6-43.el5_10.x86_64.rpm php-imap-5.1.6-43.el5_10.x86_64.rpm php-ldap-5.1.6-43.el5_10.x86_64.rpm php-mbstring-5.1.6-43.el5_10.x86_64.rpm php-mysql-5.1.6-43.el5_10.x86_64.rpm php-ncurses-5.1.6-43.el5_10.x86_64.rpm php-odbc-5.1.6-43.el5_10.x86_64.rpm php-pdo-5.1.6-43.el5_10.x86_64.rpm php-pgsql-5.1.6-43.el5_10.x86_64.rpm php-snmp-5.1.6-43.el5_10.x86_64.rpm php-soap-5.1.6-43.el5_10.x86_64.rpm php-xml-5.1.6-43.el5_10.x86_64.rpm php-xmlrpc-5.1.6-43.el5_10.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/php-5.1.6-43.el5_10.src.rpm i386: php-5.1.6-43.el5_10.i386.rpm php-bcmath-5.1.6-43.el5_10.i386.rpm php-cli-5.1.6-43.el5_10.i386.rpm php-common-5.1.6-43.el5_10.i386.rpm php-dba-5.1.6-43.el5_10.i386.rpm php-debuginfo-5.1.6-43.el5_10.i386.rpm php-devel-5.1.6-43.el5_10.i386.rpm php-gd-5.1.6-43.el5_10.i386.rpm php-imap-5.1.6-43.el5_10.i386.rpm php-ldap-5.1.6-43.el5_10.i386.rpm php-mbstring-5.1.6-43.el5_10.i386.rpm php-mysql-5.1.6-43.el5_10.i386.rpm php-ncurses-5.1.6-43.el5_10.i386.rpm php-odbc-5.1.6-43.el5_10.i386.rpm php-pdo-5.1.6-43.el5_10.i386.rpm php-pgsql-5.1.6-43.el5_10.i386.rpm php-snmp-5.1.6-43.el5_10.i386.rpm php-soap-5.1.6-43.el5_10.i386.rpm php-xml-5.1.6-43.el5_10.i386.rpm php-xmlrpc-5.1.6-43.el5_10.i386.rpm ia64: php-5.1.6-43.el5_10.ia64.rpm php-bcmath-5.1.6-43.el5_10.ia64.rpm php-cli-5.1.6-43.el5_10.ia64.rpm php-common-5.1.6-43.el5_10.ia64.rpm php-dba-5.1.6-43.el5_10.ia64.rpm php-debuginfo-5.1.6-43.el5_10.ia64.rpm php-devel-5.1.6-43.el5_10.ia64.rpm php-gd-5.1.6-43.el5_10.ia64.rpm php-imap-5.1.6-43.el5_10.ia64.rpm php-ldap-5.1.6-43.el5_10.ia64.rpm php-mbstring-5.1.6-43.el5_10.ia64.rpm php-mysql-5.1.6-43.el5_10.ia64.rpm php-ncurses-5.1.6-43.el5_10.ia64.rpm php-odbc-5.1.6-43.el5_10.ia64.rpm php-pdo-5.1.6-43.el5_10.ia64.rpm php-pgsql-5.1.6-43.el5_10.ia64.rpm php-snmp-5.1.6-43.el5_10.ia64.rpm php-soap-5.1.6-43.el5_10.ia64.rpm php-xml-5.1.6-43.el5_10.ia64.rpm php-xmlrpc-5.1.6-43.el5_10.ia64.rpm ppc: php-5.1.6-43.el5_10.ppc.rpm php-bcmath-5.1.6-43.el5_10.ppc.rpm php-cli-5.1.6-43.el5_10.ppc.rpm php-common-5.1.6-43.el5_10.ppc.rpm php-dba-5.1.6-43.el5_10.ppc.rpm php-debuginfo-5.1.6-43.el5_10.ppc.rpm php-devel-5.1.6-43.el5_10.ppc.rpm php-gd-5.1.6-43.el5_10.ppc.rpm php-imap-5.1.6-43.el5_10.ppc.rpm php-ldap-5.1.6-43.el5_10.ppc.rpm php-mbstring-5.1.6-43.el5_10.ppc.rpm php-mysql-5.1.6-43.el5_10.ppc.rpm php-ncurses-5.1.6-43.el5_10.ppc.rpm php-odbc-5.1.6-43.el5_10.ppc.rpm php-pdo-5.1.6-43.el5_10.ppc.rpm php-pgsql-5.1.6-43.el5_10.ppc.rpm php-snmp-5.1.6-43.el5_10.ppc.rpm php-soap-5.1.6-43.el5_10.ppc.rpm php-xml-5.1.6-43.el5_10.ppc.rpm php-xmlrpc-5.1.6-43.el5_10.ppc.rpm s390x: php-5.1.6-43.el5_10.s390x.rpm php-bcmath-5.1.6-43.el5_10.s390x.rpm php-cli-5.1.6-43.el5_10.s390x.rpm php-common-5.1.6-43.el5_10.s390x.rpm php-dba-5.1.6-43.el5_10.s390x.rpm php-debuginfo-5.1.6-43.el5_10.s390x.rpm php-devel-5.1.6-43.el5_10.s390x.rpm php-gd-5.1.6-43.el5_10.s390x.rpm php-imap-5.1.6-43.el5_10.s390x.rpm php-ldap-5.1.6-43.el5_10.s390x.rpm php-mbstring-5.1.6-43.el5_10.s390x.rpm php-mysql-5.1.6-43.el5_10.s390x.rpm php-ncurses-5.1.6-43.el5_10.s390x.rpm php-odbc-5.1.6-43.el5_10.s390x.rpm php-pdo-5.1.6-43.el5_10.s390x.rpm php-pgsql-5.1.6-43.el5_10.s390x.rpm php-snmp-5.1.6-43.el5_10.s390x.rpm php-soap-5.1.6-43.el5_10.s390x.rpm php-xml-5.1.6-43.el5_10.s390x.rpm php-xmlrpc-5.1.6-43.el5_10.s390x.rpm x86_64: php-5.1.6-43.el5_10.x86_64.rpm php-bcmath-5.1.6-43.el5_10.x86_64.rpm php-cli-5.1.6-43.el5_10.x86_64.rpm php-common-5.1.6-43.el5_10.x86_64.rpm php-dba-5.1.6-43.el5_10.x86_64.rpm php-debuginfo-5.1.6-43.el5_10.x86_64.rpm php-devel-5.1.6-43.el5_10.x86_64.rpm php-gd-5.1.6-43.el5_10.x86_64.rpm php-imap-5.1.6-43.el5_10.x86_64.rpm php-ldap-5.1.6-43.el5_10.x86_64.rpm php-mbstring-5.1.6-43.el5_10.x86_64.rpm php-mysql-5.1.6-43.el5_10.x86_64.rpm php-ncurses-5.1.6-43.el5_10.x86_64.rpm php-odbc-5.1.6-43.el5_10.x86_64.rpm php-pdo-5.1.6-43.el5_10.x86_64.rpm php-pgsql-5.1.6-43.el5_10.x86_64.rpm php-snmp-5.1.6-43.el5_10.x86_64.rpm php-soap-5.1.6-43.el5_10.x86_64.rpm php-xml-5.1.6-43.el5_10.x86_64.rpm php-xmlrpc-5.1.6-43.el5_10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1398.html https://www.redhat.com/security/data/cve/CVE-2012-2688.html https://www.redhat.com/security/data/cve/CVE-2013-1643.html https://www.redhat.com/security/data/cve/CVE-2013-6420.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFSp/lUXlSAg2UNWIIRAg3qAKCLrXnldIIb+gT/ejo0mArGTwf5/wCeKWU6 7KTGqsotCnj/o6YIFWGea9k= =hKGM -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 4 ELS) - i386, x86_64 3

Trust: 2.16

sources: NVD: CVE-2013-6420 // BID: 64225 // VULHUB: VHN-66422 // PACKETSTORM: 128049 // PACKETSTORM: 124882 // PACKETSTORM: 124384 // PACKETSTORM: 124407 // PACKETSTORM: 128505 // PACKETSTORM: 124776 // PACKETSTORM: 125427 // PACKETSTORM: 124382 // PACKETSTORM: 124391 // PACKETSTORM: 124389

AFFECTED PRODUCTS

vendor:phpmodel:phpscope:eqversion:5.5.4

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.5.6

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.5.2

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.5.1

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.5.5

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.5.3

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.5.0

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.4.3

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.4.2

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.4.1

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.13

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.12

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.9

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.8

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.7

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.6

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.5

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.2

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.1

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.4

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.3

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.11

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.3.10

Trust: 1.3

vendor:applemodel:mac os xscope:lteversion:10.9.1

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.6

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.17

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.14

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.13

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.22

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.19

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.23

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.20

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.17

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.4

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.16

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.12

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.7

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.24

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.26

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.14

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.5

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.16

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.9

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.22

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.15

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.19

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.11

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.25

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.8

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.21

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:12.3

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.21

Trust: 1.0

vendor:phpmodel:phpscope:lteversion:5.3.27

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.15

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:12.2

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.0

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.10

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.18

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.0

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.3.18

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.4.20

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.4

Trust: 1.0

vendor:ubuntumodel:linux ltsscope:eqversion:10.04

Trust: 0.3

vendor:susemodel:linux enterprise server sp3 ltssscope:eqversion:10

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.17

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.15

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.14

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.2

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.1

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.1

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.0

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.3

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

sources: BID: 64225 // CNNVD: CNNVD-201312-348 // NVD: CVE-2013-6420

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-6420
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201312-348
value: HIGH

Trust: 0.6

VULHUB: VHN-66422
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-6420
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-66422
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-66422 // CNNVD: CNNVD-201312-348 // NVD: CVE-2013-6420

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.1

sources: VULHUB: VHN-66422 // NVD: CVE-2013-6420

THREAT TYPE

remote

Trust: 1.2

sources: PACKETSTORM: 128049 // PACKETSTORM: 124882 // PACKETSTORM: 124384 // PACKETSTORM: 124382 // PACKETSTORM: 124391 // PACKETSTORM: 124389 // CNNVD: CNNVD-201312-348

TYPE

arbitrary

Trust: 0.6

sources: PACKETSTORM: 128049 // PACKETSTORM: 124384 // PACKETSTORM: 124407 // PACKETSTORM: 124382 // PACKETSTORM: 124391 // PACKETSTORM: 124389

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-66422

PATCH

title:php-5.5.7url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47192

Trust: 0.6

title:php-5.4.23url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47191

Trust: 0.6

title:php-5.3.28url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47190

Trust: 0.6

sources: CNNVD: CNNVD-201312-348

EXTERNAL IDS

db:NVDid:CVE-2013-6420

Trust: 3.0

db:BIDid:64225

Trust: 1.4

db:SECTRACKid:1029472

Trust: 1.1

db:SECUNIAid:59652

Trust: 1.1

db:CNNVDid:CNNVD-201312-348

Trust: 0.7

db:SECUNIAid:56071

Trust: 0.6

db:SECUNIAid:56055

Trust: 0.6

db:SECUNIAid:56070

Trust: 0.6

db:PACKETSTORMid:124391

Trust: 0.2

db:PACKETSTORMid:124776

Trust: 0.2

db:PACKETSTORMid:124389

Trust: 0.2

db:PACKETSTORMid:124384

Trust: 0.2

db:PACKETSTORMid:124407

Trust: 0.2

db:PACKETSTORMid:124532

Trust: 0.1

db:PACKETSTORMid:124390

Trust: 0.1

db:PACKETSTORMid:124383

Trust: 0.1

db:PACKETSTORMid:124436

Trust: 0.1

db:PACKETSTORMid:124406

Trust: 0.1

db:SEEBUGid:SSVID-83792

Trust: 0.1

db:EXPLOIT-DBid:30395

Trust: 0.1

db:VULHUBid:VHN-66422

Trust: 0.1

db:PACKETSTORMid:128049

Trust: 0.1

db:PACKETSTORMid:124882

Trust: 0.1

db:PACKETSTORMid:128505

Trust: 0.1

db:PACKETSTORMid:125427

Trust: 0.1

db:PACKETSTORMid:124382

Trust: 0.1

sources: VULHUB: VHN-66422 // BID: 64225 // PACKETSTORM: 128049 // PACKETSTORM: 124882 // PACKETSTORM: 124384 // PACKETSTORM: 124407 // PACKETSTORM: 128505 // PACKETSTORM: 124776 // PACKETSTORM: 125427 // PACKETSTORM: 124382 // PACKETSTORM: 124391 // PACKETSTORM: 124389 // CNNVD: CNNVD-201312-348 // NVD: CVE-2013-6420

REFERENCES

url:http://www.php.net/changelog-5.php

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=1036830

Trust: 1.7

url:https://www.sektioneins.de/advisories/advisory-012013-php-openssl_x509_parse-memory-corruption-vulnerability.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2013-1815.html

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2013-1825.html

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2013-1826.html

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2055-1

Trust: 1.2

url:http://www.securityfocus.com/bid/64225

Trust: 1.1

url:http://forums.interworx.com/threads/8000-interworx-version-5-0-14-released-on-beta-channel%21

Trust: 1.1

url:http://support.apple.com/kb/ht6150

Trust: 1.1

url:http://www.debian.org/security/2013/dsa-2816

Trust: 1.1

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04463322

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2013-1813.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2013-1824.html

Trust: 1.1

url:http://www.securitytracker.com/id/1029472

Trust: 1.1

url:http://secunia.com/advisories/59652

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6420

Trust: 1.0

url:http://git.php.net/?p=php-src.git%3ba=commit%3bh=c1224573c773b6845e83505f717fbf820fc18415

Trust: 1.0

url:http://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415

Trust: 0.7

url:http://secunia.com/advisories/56055

Trust: 0.6

url:http://secunia.com/advisories/56070

Trust: 0.6

url:http://secunia.com/advisories/56071

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2013-6712

Trust: 0.4

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/team/key/#package

Trust: 0.4

url:https://access.redhat.com/site/articles/11258

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2013-6420.html

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:http://www.php.net/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-4248

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-1643

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-4113

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6420

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4670

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4635

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3597

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4636

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1635

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1943

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0238

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2110

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2497

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0185

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4113

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1635

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1943

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7345

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-5120

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3735

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2497

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201408-11.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4718

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7327

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2270

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-7327

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0237

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3981

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1824

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0185

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6420

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0237

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3597

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4636

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7226

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4670

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1643

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6712

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-7226

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4718

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0238

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4049

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-7345

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2270

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-5120

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3735

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2110

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4248

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4049

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3981

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4635

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4248

Trust: 0.1

url:http://www.php.net/changelog-5.php#5.5.8

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6712

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php5/5.4.9-4ubuntu2.4

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php5/5.3.2-1ubuntu4.22

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.9

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php5/5.5.3+dfsg-1ubuntu2.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php5/5.4.6-1ubuntu1.5

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2640

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6422

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4545

Trust: 0.1

url:http://h18013.www1.hp.com/products/servers/management/agents/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2641

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2642

Trust: 0.1

url:http://slackware.com

Trust: 0.1

url:http://osuosl.org)

Trust: 0.1

url:http://slackware.com/gpg-key

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1255

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6629

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5179

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1250

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1245

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1259

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5987

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1254

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1256

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1258

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1249

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1248

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1247

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3389

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4073

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5139

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1261

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1896

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1260

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1246

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1862

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1257

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5986

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1252

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2688

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1398.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1398

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2013-1814.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2012-2688.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-1643.html

Trust: 0.1

sources: VULHUB: VHN-66422 // BID: 64225 // PACKETSTORM: 128049 // PACKETSTORM: 124882 // PACKETSTORM: 124384 // PACKETSTORM: 124407 // PACKETSTORM: 128505 // PACKETSTORM: 124776 // PACKETSTORM: 125427 // PACKETSTORM: 124382 // PACKETSTORM: 124391 // PACKETSTORM: 124389 // CNNVD: CNNVD-201312-348 // NVD: CVE-2013-6420

CREDITS

Red Hat

Trust: 0.4

sources: PACKETSTORM: 124384 // PACKETSTORM: 124382 // PACKETSTORM: 124391 // PACKETSTORM: 124389

SOURCES

db:VULHUBid:VHN-66422
db:BIDid:64225
db:PACKETSTORMid:128049
db:PACKETSTORMid:124882
db:PACKETSTORMid:124384
db:PACKETSTORMid:124407
db:PACKETSTORMid:128505
db:PACKETSTORMid:124776
db:PACKETSTORMid:125427
db:PACKETSTORMid:124382
db:PACKETSTORMid:124391
db:PACKETSTORMid:124389
db:CNNVDid:CNNVD-201312-348
db:NVDid:CVE-2013-6420

LAST UPDATE DATE

2025-04-30T02:18:14.462000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-66422date:2018-10-30T00:00:00
db:BIDid:64225date:2015-07-15T00:13:00
db:CNNVDid:CNNVD-201312-348date:2013-12-18T00:00:00
db:NVDid:CVE-2013-6420date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-66422date:2013-12-17T00:00:00
db:BIDid:64225date:2013-12-09T00:00:00
db:PACKETSTORMid:128049date:2014-08-29T22:24:02
db:PACKETSTORMid:124882date:2014-01-22T01:55:34
db:PACKETSTORMid:124384date:2013-12-11T06:56:45
db:PACKETSTORMid:124407date:2013-12-14T00:04:46
db:PACKETSTORMid:128505date:2014-10-01T19:15:04
db:PACKETSTORMid:124776date:2014-01-14T14:44:00
db:PACKETSTORMid:125427date:2014-02-26T22:21:07
db:PACKETSTORMid:124382date:2013-12-11T06:56:03
db:PACKETSTORMid:124391date:2013-12-12T04:29:50
db:PACKETSTORMid:124389date:2013-12-12T04:29:33
db:CNNVDid:CNNVD-201312-348date:2013-12-18T00:00:00
db:NVDid:CVE-2013-6420date:2013-12-17T04:46:45.877