Debian Security Advisory DSA-3265-1 email@example.com http://www.debian.org/security/ David PrÃ©vot May 20, 2015 http://www.debian.org/security/faq
Package : zendframework CVE ID : CVE-2014-2681 CVE-2014-2682 CVE-2014-2683 CVE-2014-2684 CVE-2014-2685 CVE-2014-4914 CVE-2014-8088 CVE-2014-8089 CVE-2015-3154 Debian Bug : 743175 754201
Multiple vulnerabilities were discovered in Zend Framework, a PHP framework. Except for CVE-2015-3154, all these issues were already fixed in the version initially shipped with Jessie.
Lukas Reschke reported a lack of protection against XML External Entity injection attacks in some functions. This fix extends the incomplete one from CVE-2012-5657.
Lukas Reschke reported a failure to consider that the libxml_disable_entity_loader setting is shared among threads in the PHP-FPM case. This fix extends the incomplete one from CVE-2012-5657.
Lukas Reschke reported a lack of protection against XML Entity Expansion attacks in some functions. This fix extends the incomplete one from CVE-2012-6532.
Christian Mainka and Vladislav Mladenov from the Ruhr-University Bochum reported an error in the consumer's verify method that lead to acceptance of wrongly sourced tokens.
Christian Mainka and Vladislav Mladenov from the Ruhr-University Bochum reported a specification violation in which signing of a single parameter is incorrectly considered sufficient.
Cassiano Dal Pizzol discovered that the implementation of the ORDER BY SQL statement in Zend_Db_Select contains a potential SQL injection when the query string passed contains parentheses.
Yury Dyachenko at Positive Research Center identified potential XML eXternal Entity injection vectors due to insecure usage of PHP's DOM extension.
Jonas SandstrÃ¶m discovered an SQL injection vector when manually quoting value for sqlsrv extension, using null byte.
Filippo Tessarotto and Maks3w reported potential CRLF injection attacks in mail and HTTP headers.
For the oldstable distribution (wheezy), these problems have been fixed in version 1.11.13-1.1+deb7u1.
For the stable distribution (jessie), these problems have been fixed in version 1.12.9+dfsg-2+deb8u1.
For the testing distribution (stretch), these problems will be fixed in version 1.12.12+dfsg-1.
For the unstable distribution (sid), these problems have been fixed in version 1.12.12+dfsg-1.
We recommend that you upgrade your zendframework packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: firstname.lastname@example.org