{
  "threat_severity" : "Critical",
  "public_date" : "2013-12-10T00:00:00Z",
  "bugzilla" : {
    "description" : "php: memory corruption in openssl_x509_parse()",
    "id" : "1036830",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1036830"
  },
  "cvss" : {
    "cvss_base_score" : "7.5",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cwe" : "CWE-130->CWE-119",
  "details" : [ "The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function." ],
  "acknowledgement" : "Red Hat would like to thank PHP project for reporting this issue. Upstream acknowledges Stefan Esser as the original reporter.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 3 Extended Lifecycle Support",
    "release_date" : "2013-12-12T00:00:00Z",
    "advisory" : "RHSA-2013:1826",
    "cpe" : "cpe:/o:redhat:rhel_els:3",
    "package" : "php-0:4.3.2-57.ent"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4 Extended Lifecycle Support",
    "release_date" : "2013-12-12T00:00:00Z",
    "advisory" : "RHSA-2013:1826",
    "cpe" : "cpe:/o:redhat:rhel_els:4",
    "package" : "php-0:4.3.9-3.37.el4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2013-12-11T00:00:00Z",
    "advisory" : "RHSA-2013:1813",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "php53-0:5.3.3-22.el5_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2013-12-11T00:00:00Z",
    "advisory" : "RHSA-2013:1814",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "php-0:5.1.6-43.el5_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.3 Long Life",
    "release_date" : "2013-12-11T00:00:00Z",
    "advisory" : "RHSA-2013:1824",
    "cpe" : "cpe:/o:redhat:rhel_mission_critical:5.3",
    "package" : "php-0:5.1.6-23.5.el5_3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.6 EUS - Server Only",
    "release_date" : "2013-12-11T00:00:00Z",
    "advisory" : "RHSA-2013:1824",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.6",
    "package" : "php-0:5.1.6-27.el5_6.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.6 EUS - Server Only",
    "release_date" : "2013-12-11T00:00:00Z",
    "advisory" : "RHSA-2013:1825",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.6",
    "package" : "php53-0:5.3.3-1.el5_6.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.9 Extended Update Support",
    "release_date" : "2013-12-11T00:00:00Z",
    "advisory" : "RHSA-2013:1824",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.9",
    "package" : "php-0:5.1.6-40.el5_9.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.9 Extended Update Support",
    "release_date" : "2013-12-11T00:00:00Z",
    "advisory" : "RHSA-2013:1825",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.9",
    "package" : "php53-0:5.3.3-13.el5_9.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2013-12-11T00:00:00Z",
    "advisory" : "RHSA-2013:1813",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "php-0:5.3.3-27.el6_5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.2 EUS - Server and Compute Node Only",
    "release_date" : "2013-12-11T00:00:00Z",
    "advisory" : "RHSA-2013:1824",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.2",
    "package" : "php-0:5.3.3-3.el6_2.11"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.3 EUS - Server and Compute Node Only",
    "release_date" : "2013-12-11T00:00:00Z",
    "advisory" : "RHSA-2013:1824",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.3",
    "package" : "php-0:5.3.3-14.el6_3.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.4 Extended Update Support",
    "release_date" : "2013-12-11T00:00:00Z",
    "advisory" : "RHSA-2013:1824",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.4",
    "package" : "php-0:5.3.3-23.el6_4.1"
  }, {
    "product_name" : "Red Hat Software Collections for RHEL-6",
    "release_date" : "2013-12-11T00:00:00Z",
    "advisory" : "RHSA-2013:1815",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:1::el6",
    "package" : "php54-php-0:5.4.16-7.el6.1"
  } ],
  "package_state" : [ {
    "product_name" : "OpenShift Enterprise 1",
    "fix_state" : "Affected",
    "package_name" : "php",
    "cpe" : "cpe:/a:redhat:openshift:1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "php",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2",
    "fix_state" : "Affected",
    "package_name" : "php",
    "cpe" : "cpe:/a:redhat:openshift:2"
  }, {
    "product_name" : "Red Hat Software Collections",
    "fix_state" : "Affected",
    "package_name" : "php55-php",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-6420\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-6420" ],
  "name" : "CVE-2013-6420",
  "csaw" : false
}