ID

VAR-201309-0194


CVE

CVE-2013-1824


TITLE

PHP of SOAP Vulnerability in parser to read arbitrary files

Trust: 0.8

sources: JVNDB: JVNDB-2013-004108

DESCRIPTION

The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. PHP is prone to multiple arbitrary file-disclosure vulnerabilities because it fails to sanitize user-supplied input. An authenticated attacker can exploit these vulnerabilities to view arbitrary files within the context of the affected application. Other attacks are also possible. Note: These issues are the result of an incomplete fix for the issues described in BID 58766 (PHP 'ext/soap/php_xml.c' Multiple Arbitrary File Disclosure Vulnerabilities). Versions prior to PHP 5.3.22 and 5.4.13 are vulnerable. PHP (PHP: Hypertext Preprocessor, PHP: Hypertext Preprocessor) is an open source general-purpose computer scripting language jointly maintained by the PHP Group and the open source community. The language is mainly used for Web development and supports a variety of databases and operating systems. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201408-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: PHP: Multiple vulnerabilities Date: August 29, 2014 Bugs: #459904, #472204, #472558, #474656, #476570, #481004, #483212, #485252, #492784, #493982, #501312, #503630, #503670, #505172, #505712, #509132, #512288, #512492, #513032, #516994, #519932, #520134, #520438 ID: 201408-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to remote execution of arbitrary code. Background ========== PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-lang/php < 5.5.16 >= 5.5.16 *>= 5.4.32 *>= 5.3.29 Description =========== Multiple vulnerabilities have been discovered in PHP. Please review the CVE identifiers referenced below for details. Impact ====== A context-dependent attacker can cause arbitrary code execution, create a Denial of Service condition, read or write arbitrary files, impersonate other servers, hijack a web session, or have other unspecified impact. Additionally, a local attacker could gain escalated privileges. Workaround ========== There is no known workaround at this time. Resolution ========== All PHP 5.5 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/php-5.5.16" All PHP 5.4 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/php-5.4.32" All PHP 5.3 users should upgrade to the latest version. This release marks the end of life of the PHP 5.3 series. Future releases of this series are not planned. # emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/php-5.3.29" References ========== [ 1 ] CVE-2011-4718 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4718 [ 2 ] CVE-2013-1635 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1635 [ 3 ] CVE-2013-1643 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1643 [ 4 ] CVE-2013-1824 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1824 [ 5 ] CVE-2013-2110 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2110 [ 6 ] CVE-2013-3735 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3735 [ 7 ] CVE-2013-4113 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4113 [ 8 ] CVE-2013-4248 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4248 [ 9 ] CVE-2013-4635 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4635 [ 10 ] CVE-2013-4636 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4636 [ 11 ] CVE-2013-6420 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6420 [ 12 ] CVE-2013-6712 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6712 [ 13 ] CVE-2013-7226 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7226 [ 14 ] CVE-2013-7327 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7327 [ 15 ] CVE-2013-7345 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345 [ 16 ] CVE-2014-0185 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0185 [ 17 ] CVE-2014-0237 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0237 [ 18 ] CVE-2014-0238 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0238 [ 19 ] CVE-2014-1943 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943 [ 20 ] CVE-2014-2270 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270 [ 21 ] CVE-2014-2497 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2497 [ 22 ] CVE-2014-3597 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3597 [ 23 ] CVE-2014-3981 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3981 [ 24 ] CVE-2014-4049 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4049 [ 25 ] CVE-2014-4670 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4670 [ 26 ] CVE-2014-5120 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5120 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201408-11.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-09-12-1 OS X Mountain Lion v10.8.5 and Security Update 2013-004 OS X Mountain Lion v10.8.5 and Security Update 2013-004 is now available and addresses the following: Apache Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4 Impact: Multiple vulnerabilities in Apache Description: Multiple vulnerabilities existed in Apache, the most serious of which may lead to cross-site scripting. These issues were addressed by updating Apache to version 2.2.24. CVE-ID CVE-2012-0883 CVE-2012-2687 CVE-2012-3499 CVE-2012-4558 Bind Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4 Impact: Multiple vulnerabilities in BIND Description: Multiple vulnerabilities existed in BIND, the most serious of which may lead to a denial of service. These issues were addressed by updating BIND to version 9.8.5-P1. CVE-2012-5688 did not affect Mac OS X v10.7 systems. CVE-ID CVE-2012-3817 CVE-2012-4244 CVE-2012-5166 CVE-2012-5688 CVE-2013-2266 Certificate Trust Policy Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4 Impact: Root certificates have been updated Description: Several certificates were added to or removed from the list of system roots. The complete list of recognized system roots may be viewed via the Keychain Access application. ClamAV Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7.5, OS X Lion Server v10.7.5 Impact: Multiple vulnerabilities in ClamAV Description: Multiple vulnerabilities exist in ClamAV, the most serious of which may lead to arbitrary code execution. This update addresses the issues by updating ClamAV to version 0.97.8. CVE-ID CVE-2013-2020 CVE-2013-2021 CoreGraphics Available for: OS X Mountain Lion v10.8 to v10.8.4 Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JBIG2 encoded data in PDF files. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-1025 : Felix Groebert of the Google Security Team ImageIO Available for: OS X Mountain Lion v10.8 to v10.8.4 Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JPEG2000 encoded data in PDF files. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-1026 : Felix Groebert of the Google Security Team Installer Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4 Impact: Packages could be opened after certificate revocation Description: When Installer encountered a revoked certificate, it would present a dialog with an option to continue. The issue was addressed by removing the dialog and refusing any revoked package. CVE-ID CVE-2013-1027 IPSec Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4 Impact: An attacker may intercept data protected with IPSec Hybrid Auth Description: The DNS name of an IPSec Hybrid Auth server was not being matched against the certificate, allowing an attacker with a certificate for any server to impersonate any other. This issue was addressed by properly checking the certificate. CVE-ID CVE-2013-1028 : Alexander Traud of www.traud.de Kernel Available for: OS X Mountain Lion v10.8 to v10.8.4 Impact: A local network user may cause a denial of service Description: An incorrect check in the IGMP packet parsing code in the kernel allowed a user who could send IGMP packets to the system to cause a kernel panic. The issue was addressed by removing the check. CVE-ID CVE-2013-1029 : Christopher Bohn of PROTECTSTAR INC. Mobile Device Management Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4 Impact: Passwords may be disclosed to other local users Description: A password was passed on the command-line to mdmclient, which made it visible to other users on the same system. The issue was addressed by communicating the password through a pipe. CVE-ID CVE-2013-1030 : Per Olofsson at the University of Gothenburg OpenSSL Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4 Impact: Multiple vulnerabilities in OpenSSL Description: Multiple vulnerabilities existed in OpenSSL, the most serious of which may lead to disclosure of user data. These issues were addressed by updating OpenSSL to version 0.9.8y. CVE-ID CVE-2012-2686 CVE-2013-0166 CVE-2013-0169 PHP Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4 Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP, the most serious of which may lead to arbitrary code execution. These issues were addressed by updating PHP to version 5.3.26. CVE-ID CVE-2013-1635 CVE-2013-1643 CVE-2013-1824 CVE-2013-2110 PostgreSQL Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4 Impact: Multiple vulnerabilities in PostgreSQL Description: Multiple vulnerabilities exist in PostgreSQL, the most serious of which may lead to data corruption or privilege escalation. This update addresses the issues by updating PostgreSQL to version 9.0.13. CVE-ID CVE-2013-1899 CVE-2013-1900 CVE-2013-1901 CVE-2013-1902 CVE-2013-1903 Power Management Available for: OS X Mountain Lion v10.8 to v10.8.4 Impact: The screen saver may not start after the specified time period Description: A power assertion lock issue existed. This issue was addressed through improved lock handling. CVE-ID CVE-2013-1031 QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of 'idsc' atoms in QuickTime movie files. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-1032 : Jason Kratzer working with iDefense VCP Screen Lock Available for: OS X Mountain Lion v10.8 to v10.8.4 Impact: A user with screen sharing access may be able to bypass the screen lock when another user is logged in Description: A session management issue existed in the screen lock's handling of screen sharing sessions. This issue was addressed through improved session tracking. CVE-ID CVE-2013-1033 : Jeff Grisso of Atos IT Solutions, Sebastien Stormacq Note: OS X Mountain Lion v10.8.5 also addresses an issue where certain Unicode strings could cause applications to unexpectedly terminate. OS X Mountain Lion v10.8.5 and Security Update 2013-004 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ The Software Update utility will present the update that applies to your system configuration. Only one is needed, either OS X Mountain Lion v10.8.5, or Security Update 2013-004. For OS X Mountain Lion v10.8.4 The download file is named: OSXUpd10.8.5.dmg Its SHA-1 digest is: a74ab6d9501778437e7afba0bbed47b776a52b11 For OS X Mountain Lion v10.8 and v10.8.3 The download file is named: OSXUpdCombo10.8.5.dmg Its SHA-1 digest is: cb798ac9b97ceb2d8875af040ce4ff06187d61f2 For OS X Lion v10.7.5 The download file is named: SecUpd2013-004.dmg Its SHA-1 digest is: dbc50fce7070f83b93b866a21b8f5c6e65007fa0 For OS X Lion Server v10.7.5 The download file is named: SecUpdSrvr2013-004.dmg Its SHA-1 digest is: 44a77edbd37732b865bc21a9aac443a3cdc47355 For Mac OS X v10.6.8 The download file is named: SecUpd2013-004.dmg Its SHA-1 digest is: d07d5142a2549270f0d2eaddb262b41bb5c16b61 For Mac OS X Server v10.6.8 The download file is named: SecUpdSrvr2013-004.dmg Its SHA-1 digest is: 8f9abe93f7f9427cf86b89bd67df948a85537dbc Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJSMiPGAAoJEPefwLHPlZEw9qMP/17D4Q8velZ3H4AumPzHqqB4 QxPcuv8PXzhi55epUm2bzNfXR9A5L9KvzEsmggqxO2/ESO0zfeKgAmXXjCI3z5Qc +WkHgqowjwXU9cbjyDkhwb/ylXml+vCSIv2m9eXXNRTRi0rm9ZLSI/JMSRfLMojQ bZbzQSoSpuGaOeOOWESKCf9zBXFG6DBGo0wg3z8Bkywjtp/7bfddPAFHxIdhjDDN 1IgmhPRnP6NEdNSfR6RwF94M+hyiJ2I2DIDZTIo+6B4Ne90bEYdBiQmSxwKFAyc3 H9VFfB8XmrtA2k4DhE6Ow2jD/Y//QKz6TbyZNSQawXxuPsj43v6/T6BsWdfddGbQ hDGU85e7z7a4gmIPuS3DjMhSEyAixL/B3vKYBaZltH6JBCcPuLvGrU7nAiJa7KGQ 8MToOyv42TSj95drFzysk5fcO0MIUH5xiGlaU+ScEdBSpIpHDfpjeJYPqxHeGFaa V2xCGw1vMYbMoxNzRL0FPPdUxJkyBHvuzZXh6c6fATuQIPCtwejpPrYEo7x7RRpl ytsVLe3V27j7IfWb62nI+mNVfH5m+YgK4SGK5DSq8Nm1Lk0w4HXmTtrhOCogsJ2I yoqeg/XakiSdxZxhSa9/ZZsMB+D1B8siNzCj0+U0k4zYjxEA0GdSu/dYRVT62oIn vBrJ5gm+nnyRe2TUMAwz =h9hc -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2013-1824 // JVNDB: JVNDB-2013-004108 // BID: 62373 // VULHUB: VHN-61826 // PACKETSTORM: 128049 // PACKETSTORM: 123228

AFFECTED PRODUCTS

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 1.0

vendor:phpmodel:phpscope:ltversion:5.3.22

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.8.5

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.0.0

Trust: 1.0

vendor:phpmodel:phpscope:ltversion:5.4.12

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:phpmodel:phpscope:gteversion:5.4.0

Trust: 1.0

vendor:the php groupmodel:phpscope:eqversion:5.4.12

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.8 to v10.8.4

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.6.8

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:6

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7.5

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:10.6.8

Trust: 0.8

vendor:the php groupmodel:phpscope:ltversion:5.4.x

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.7.5

Trust: 0.8

vendor:phpmodel:phpscope:eqversion:5.3.8

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.3.3

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.3.21

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.3.7

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.3.5

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.3.20

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.3.2

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.3.19

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.3.4

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.3.6

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.4.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.10

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.8

Trust: 0.3

sources: BID: 62373 // JVNDB: JVNDB-2013-004108 // CNNVD: CNNVD-201309-217 // NVD: CVE-2013-1824

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1824
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-1824
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201309-217
value: MEDIUM

Trust: 0.6

VULHUB: VHN-61826
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-1824
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61826
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61826 // JVNDB: JVNDB-2013-004108 // CNNVD: CNNVD-201309-217 // NVD: CVE-2013-1824

PROBLEMTYPE DATA

problemtype:CWE-611

Trust: 1.1

problemtype:CWE-200

Trust: 0.9

sources: VULHUB: VHN-61826 // JVNDB: JVNDB-2013-004108 // NVD: CVE-2013-1824

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 128049 // CNNVD: CNNVD-201309-217

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201309-217

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004108

PATCH

title:APPLE-SA-2013-09-12-1url:http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html

Trust: 0.8

title:HT5880url:http://support.apple.com/kb/HT5880

Trust: 0.8

title:HT5880url:http://support.apple.com/kb/HT5880?viewlocale=ja_JP

Trust: 0.8

title:Disabled external entities loadingurl:http://git.php.net/?p=php-src.git;a=commit;h=afe98b7829d50806559acac9b530acb8283c3bf4

Trust: 0.8

title:Proper bit reset codeurl:http://git.php.net/?p=php-src.git;a=commit;h=188c196d4da60bdde9190d2fc532650d17f7af2d

Trust: 0.8

title:Bug 918187url:https://bugzilla.redhat.com/show_bug.cgi?id=918187

Trust: 0.8

title:CVE-2013-1824 in Ubuntuurl:http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-1824.html

Trust: 0.8

title:PHP SOAP Fixes for parser information disclosure vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=91854

Trust: 0.6

sources: JVNDB: JVNDB-2013-004108 // CNNVD: CNNVD-201309-217

EXTERNAL IDS

db:NVDid:CVE-2013-1824

Trust: 3.0

db:JVNid:JVNVU97033473

Trust: 0.8

db:JVNDBid:JVNDB-2013-004108

Trust: 0.8

db:CNNVDid:CNNVD-201309-217

Trust: 0.7

db:BIDid:62373

Trust: 0.4

db:VULHUBid:VHN-61826

Trust: 0.1

db:PACKETSTORMid:128049

Trust: 0.1

db:PACKETSTORMid:123228

Trust: 0.1

sources: VULHUB: VHN-61826 // BID: 62373 // JVNDB: JVNDB-2013-004108 // PACKETSTORM: 128049 // PACKETSTORM: 123228 // CNNVD: CNNVD-201309-217 // NVD: CVE-2013-1824

REFERENCES

url:http://lists.apple.com/archives/security-announce/2013/sep/msg00002.html

Trust: 1.7

url:http://git.php.net/?p=php-src.git%3ba=commit%3bh=188c196d4da60bdde9190d2fc532650d17f7af2d

Trust: 1.7

url:http://git.php.net/?p=php-src.git%3ba=commit%3bh=afe98b7829d50806559acac9b530acb8283c3bf4

Trust: 1.7

url:http://people.canonical.com/~ubuntu-security/cve/2013/cve-2013-1824.html

Trust: 1.7

url:http://support.apple.com/kb/ht5880

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=918187

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1824

Trust: 0.8

url:http://jvn.jp/cert/jvnvu97033473/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1824

Trust: 0.8

url:http://git.php.net/?p=php-src.git;a=commit;h=188c196d4da60bdde9190d2fc532650d17f7af2d

Trust: 0.6

url:http://git.php.net/?p=php-src.git;a=commit;h=afe98b7829d50806559acac9b530acb8283c3bf4

Trust: 0.6

url:http://www.php.net/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-1635

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-1643

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-1824

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4670

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4635

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3597

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4636

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1635

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1943

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0238

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2110

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2497

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0185

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4113

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1943

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7345

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-5120

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3735

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2497

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201408-11.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4718

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7327

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2270

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-7327

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0237

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3981

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6420

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0185

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6420

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0237

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3597

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4636

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7226

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4670

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1643

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6712

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-7226

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4718

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0238

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4049

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-7345

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2270

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-5120

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3735

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2110

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4248

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4049

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3981

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6712

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4248

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4113

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4635

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3499

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1899

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4558

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1903

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3817

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1025

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0169

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1029

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://www.traud.de

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2687

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1901

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1026

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4244

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1027

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1031

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1902

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1033

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1032

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1030

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2686

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1028

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5688

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0883

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1900

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0166

Trust: 0.1

sources: VULHUB: VHN-61826 // BID: 62373 // JVNDB: JVNDB-2013-004108 // PACKETSTORM: 128049 // PACKETSTORM: 123228 // CNNVD: CNNVD-201309-217 // NVD: CVE-2013-1824

CREDITS

Vendor reported these issues.

Trust: 0.3

sources: BID: 62373

SOURCES

db:VULHUBid:VHN-61826
db:BIDid:62373
db:JVNDBid:JVNDB-2013-004108
db:PACKETSTORMid:128049
db:PACKETSTORMid:123228
db:CNNVDid:CNNVD-201309-217
db:NVDid:CVE-2013-1824

LAST UPDATE DATE

2024-08-14T12:21:13.992000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-61826date:2023-02-13T00:00:00
db:BIDid:62373date:2014-09-01T00:33:00
db:JVNDBid:JVNDB-2013-004108date:2013-09-30T00:00:00
db:CNNVDid:CNNVD-201309-217date:2023-02-14T00:00:00
db:NVDid:CVE-2013-1824date:2023-02-13T04:41:37.693

SOURCES RELEASE DATE

db:VULHUBid:VHN-61826date:2013-09-16T00:00:00
db:BIDid:62373date:2013-03-20T00:00:00
db:JVNDBid:JVNDB-2013-004108date:2013-09-17T00:00:00
db:PACKETSTORMid:128049date:2014-08-29T22:24:02
db:PACKETSTORMid:123228date:2013-09-13T19:32:22
db:CNNVDid:CNNVD-201309-217date:2013-09-18T00:00:00
db:NVDid:CVE-2013-1824date:2013-09-16T13:02:34.627