Lucene search

K
amazonAmazonALAS-2014-460
HistoryDec 11, 2014 - 2:23 p.m.

Medium: php-ZendFramework

2014-12-1114:23:00
alas.aws.amazon.com
25

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

78.2%

Issue Overview:

The (1) Zend_Ldap class in Zend before 1.12.9 and (2) Zend\Ldap component in Zend 2.x before 2.2.8 and 2.3.x before 2.3.3 allows remote attackers to bypass authentication via a password starting with a null byte, which triggers an unauthenticated bind. (CVE-2014-8088)

The 1.12.9, 2.2.8, and 2.3.3 releases of the Zend Framework fix an SQL injection issue when using the sqlsrv PHP extension. Full details are available in the upstream advisory (http://framework.zend.com/security/advisory/ZF2014-06). (CVE-2014-8089)

Affected Packages:

php-ZendFramework

Issue Correction:
Run yum update php-ZendFramework to update your system.

New Packages:

noarch:  
    php-ZendFramework-full-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Serializer-Adapter-Igbinary-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Db-Adapter-Pdo-Pgsql-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Db-Adapter-Pdo-Mssql-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-extras-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Db-Adapter-Pdo-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Cache-Backend-Memcached-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Search-Lucene-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Cache-Backend-Libmemcached-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Auth-Adapter-Ldap-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Db-Adapter-Pdo-Mysql-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Cache-Backend-Apc-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Feed-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Db-Adapter-Mysqli-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Soap-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Services-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Ldap-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Dojo-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-demos-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Captcha-1.12.9-1.10.amzn1.noarch  
    php-ZendFramework-Pdf-1.12.9-1.10.amzn1.noarch  
  
src:  
    php-ZendFramework-1.12.9-1.10.amzn1.src  

Additional References

Red Hat: CVE-2014-8088, CVE-2014-8089

Mitre: CVE-2014-8088, CVE-2014-8089

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

78.2%