The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id.
2013-05-31T21:55:01.230
2025-04-11T00:51:21.963
Deferred
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | php | php | ≤ 5.4.15 | Yes |
Application | php | php | 5.4.0 | Yes |
Application | php | php | 5.4.1 | Yes |
Application | php | php | 5.4.2 | Yes |
Application | php | php | 5.4.3 | Yes |
Application | php | php | 5.4.4 | Yes |
Application | php | php | 5.4.5 | Yes |
Application | php | php | 5.4.6 | Yes |
Application | php | php | 5.4.7 | Yes |
Application | php | php | 5.4.8 | Yes |
Application | php | php | 5.4.9 | Yes |
Application | php | php | 5.4.10 | Yes |
Application | php | php | 5.4.11 | Yes |
Application | php | php | 5.4.12 | Yes |
Application | php | php | 5.4.12 | Yes |
Application | php | php | 5.4.12 | Yes |
Application | php | php | 5.4.13 | Yes |
Application | php | php | 5.4.13 | Yes |
Application | php | php | 5.4.14 | Yes |
Application | php | php | 5.4.14 | Yes |
Application | php | php | ≤ 5.5.0 | Yes |
Application | php | php | 5.5.0 | Yes |
Application | php | php | 5.5.0 | Yes |
Application | php | php | 5.5.0 | Yes |
Application | php | php | 5.5.0 | Yes |
Application | php | php | 5.5.0 | Yes |
Application | php | php | 5.5.0 | Yes |
Application | php | php | 5.5.0 | Yes |
Application | php | php | 5.5.0 | Yes |
Application | php | php | 5.5.0 | Yes |
Application | php | php | 5.5.0 | Yes |