The (1) Zend_Ldap class in Zend before 1.12.9 and (2) Zend\Ldap component in Zend 2.x before 2.2.8 and 2.3.x before 2.3.3 allows remote attackers to bypass authentication via a password starting with a null byte, which triggers an unauthenticated bind.
lists.fedoraproject.org/pipermail/package-announce/2014-October/141070.html
lists.fedoraproject.org/pipermail/package-announce/2014-October/141106.html
www.debian.org/security/2015/dsa-3265
www.openwall.com/lists/oss-security/2014/10/10/5
www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
www.securityfocus.com/bid/70378
exchange.xforce.ibmcloud.com/vulnerabilities/97038
framework.zend.com/security/advisory/ZF2014-05
github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zendframework/CVE-2014-8088.yaml
github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zendframework1/CVE-2014-8088.yaml
github.com/zendframework/zendframework
github.com/zendframework/zendframework/commit/a4222a6c1dc809f0f32fdafcd1ac4d583a075f2f
nvd.nist.gov/vuln/detail/CVE-2014-8088