Lucene search

K
mageiaGentoo FoundationMGASA-2015-0370
HistorySep 15, 2015 - 5:55 p.m.

Updated php-ZendFramework packages fix CVE-2015-5161

2015-09-1517:55:06
Gentoo Foundation
advisories.mageia.org
37

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.079 Low

EPSS

Percentile

94.2%

Updated php-ZendFramework packages fix security vulnerability: Dawid Golunski discovered that when running under PHP-FPM in a threaded environment, Zend Framework, a PHP framework, did not properly handle XML data in multibyte encoding. This could be used by remote attackers to perform an XML External Entity attack via crafted XML data (CVE-2015-5161).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchphp-zendframework< 1.12.15-1php-ZendFramework-1.12.15-1.mga4

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.079 Low

EPSS

Percentile

94.2%