Categories: SecurityWorkspace

PHP Gets Security Updates

This past week, two important updates were issued for PHP, providing both security and bug fixes. Like many things in the open source world (and technology in general), there isn’t just one version of PHP that is currently in use – in fact, there are now at least three main stable releases, including PHP 5.5, 5.4 and 5.3. The new security updates are for the 5.5 and 5.4 branches.

The open-source PHP language is one of the most widely deployed technologies on the web today, powering millions of websites.

Memory heap corruption

PHP 5.4.18 fixes 30 bugs, including two that are specifically identified as security vulnerabilities. One of the security flaws is CVE-2013-4113, which is a memory heap corruption issue in PHP’s XML parser. In a heap corruption flaw, there is the potential for an attacker to abuse memory in order to get unauthorised code to run.

The CVE-2013-4113 flaw was first reported in early July and fixed in PHP 5.5.1 and PHP 5.3.27. The National Institute of Standards and Technology’s (NIST’s) National Vulnerability Database rates the flaw as only having a medium base CVSS score of 6.8 out of 10. CVSS – the Common Vulnerability Scoring System – provides a baseline for vulnerability impact and analysis.

Both PHP 5.4.18 and PHP 5.5.2 are receiving a security update for an OpenSSL flaw identified as CVE-2013-4248. The OpenSSL module in PHP enables encrypted Secure Sockets Layer (SSL) transport over the web. The CVE-2013-4248 flaw could potentially enable a man-in-the-middle (MITM) attack against SSL. In an MITM attack, the attacker sits in the middle of the transport chain, intercepting and then impersonating the legitimate traffic.

Strict Sessions

PHP 5.5.2 is now also set to benefit from a new capability that will limit the risk of a security weakness known as “Session Fixation”. Session Fixation is defined by the Common Weakness Enumeration database as “authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier which gives an attacker the opportunity to steal authenticated sessions”.

The implementation of something known as “Strict Sessions” in PHP 5.5.2 is an attempt to limit the risk of Session Fixation attacks. The proposal to include Strict Sessions in PHP was first made in 2011, so this is an effort that is years in the making.

PHP 5.5 itself was first released in June of this year and isn’t yet widely deployed. It’ll be interesting to see if the Strict Sessions capability is backported to PHP 5.4 and 5.3 in the coming weeks.

Are you a security pro? Try our quiz!

Originally published on eWeek.

Sean Michael Kerner

Sean Michael Kerner is a senior editor at eWeek and contributor to TechWeek

Recent Posts

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

6 hours ago

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

8 hours ago

LastPass Separates From Parent After Security Incidents

New chapter for LastPass as it becomes an independent company to focus on cybersecurity, after…

10 hours ago

US To Ban Huawei, ZTE From Certifying Wireless Kit

US FCC seeks to ban Chinese telecom firms at centre of national security concerns from…

14 hours ago

Anthropic Launches Enterprise-Focused Claude, Plus iPhone App

Two updates to Anthropic's AI chatbot Claude sees arrival of a new business-focused plan, as…

16 hours ago