DSA-3265-1 zendframework -- security update

Related Vulnerabilities: CVE-2014-2681   CVE-2014-2682   CVE-2014-2683   CVE-2014-2684   CVE-2014-2685   CVE-2014-4914   CVE-2014-8088   CVE-2014-8089   CVE-2015-3154   CVE-2012-5657   CVE-2012-6532  

Multiple vulnerabilities were discovered in Zend Framework, a PHP framework. Except for CVE-2015-3154, all these issues were already fixed in the version initially shipped with Jessie. CVE-2014-2681 Lukas Reschke reported a lack of protection against XML External Entity injection attacks in some functions. This fix extends the incomplete one from CVE-2012-5657. CVE-2014-2682 Lukas Reschke reported a failure to consider that the libxml_disable_entity_loader setting is shared among threads in the PHP-FPM case. This fix extends the incomplete one from CVE-2012-5657. CVE-2014-2683 Lukas Reschke reported a lack of protection against XML Entity Expansion attacks in some functions. This fix extends the incomplete one from CVE-2012-6532. CVE-2014-2684 Christian Mainka and Vladislav Mladenov from the Ruhr-University Bochum reported an error in the consumer's verify method that lead to acceptance of wrongly sourced tokens. CVE-2014-2685 Christian Mainka and Vladislav Mladenov from the Ruhr-University Bochum reported a specification violation in which signing of a single parameter is incorrectly considered sufficient. CVE-2014-4914 Cassiano Dal Pizzol discovered that the implementation of the ORDER BY SQL statement in Zend_Db_Select contains a potential SQL injection when the query string passed contains parentheses. CVE-2014-8088 Yury Dyachenko at Positive Research Center identified potential XML eXternal Entity injection vectors due to insecure usage of PHP's DOM extension. CVE-2014-8089 Jonas Sandström discovered an SQL injection vector when manually quoting value for sqlsrv extension, using null byte. CVE-2015-3154 Filippo Tessarotto and Maks3w reported potential CRLF injection attacks in mail and HTTP headers. For the oldstable distribution (wheezy), these problems have been fixed in version 1.11.13-1.1+deb7u1. For the stable distribution (jessie), these problems have been fixed in version 1.12.9+dfsg-2+deb8u1. For the testing distribution (stretch), these problems will be fixed in version 1.12.12+dfsg-1. For the unstable distribution (sid), these problems have been fixed in version 1.12.12+dfsg-1. We recommend that you upgrade your zendframework packages.

Debian Security Advisory

DSA-3265-1 zendframework -- security update

Date Reported:
20 May 2015
Affected Packages:
zendframework
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 743175, Bug 754201.
In Mitre's CVE dictionary: CVE-2014-2681, CVE-2014-2682, CVE-2014-2683, CVE-2014-2684, CVE-2014-2685, CVE-2014-4914, CVE-2014-8088, CVE-2014-8089, CVE-2015-3154.
More information:

Multiple vulnerabilities were discovered in Zend Framework, a PHP framework. Except for CVE-2015-3154, all these issues were already fixed in the version initially shipped with Jessie.

  • CVE-2014-2681

    Lukas Reschke reported a lack of protection against XML External Entity injection attacks in some functions. This fix extends the incomplete one from CVE-2012-5657.

  • CVE-2014-2682

    Lukas Reschke reported a failure to consider that the libxml_disable_entity_loader setting is shared among threads in the PHP-FPM case. This fix extends the incomplete one from CVE-2012-5657.

  • CVE-2014-2683

    Lukas Reschke reported a lack of protection against XML Entity Expansion attacks in some functions. This fix extends the incomplete one from CVE-2012-6532.

  • CVE-2014-2684

    Christian Mainka and Vladislav Mladenov from the Ruhr-University Bochum reported an error in the consumer's verify method that lead to acceptance of wrongly sourced tokens.

  • CVE-2014-2685

    Christian Mainka and Vladislav Mladenov from the Ruhr-University Bochum reported a specification violation in which signing of a single parameter is incorrectly considered sufficient.

  • CVE-2014-4914

    Cassiano Dal Pizzol discovered that the implementation of the ORDER BY SQL statement in Zend_Db_Select contains a potential SQL injection when the query string passed contains parentheses.

  • CVE-2014-8088

    Yury Dyachenko at Positive Research Center identified potential XML eXternal Entity injection vectors due to insecure usage of PHP's DOM extension.

  • CVE-2014-8089

    Jonas Sandström discovered an SQL injection vector when manually quoting value for sqlsrv extension, using null byte.

  • CVE-2015-3154

    Filippo Tessarotto and Maks3w reported potential CRLF injection attacks in mail and HTTP headers.

For the oldstable distribution (wheezy), these problems have been fixed in version 1.11.13-1.1+deb7u1.

For the stable distribution (jessie), these problems have been fixed in version 1.12.9+dfsg-2+deb8u1.

For the testing distribution (stretch), these problems will be fixed in version 1.12.12+dfsg-1.

For the unstable distribution (sid), these problems have been fixed in version 1.12.12+dfsg-1.

We recommend that you upgrade your zendframework packages.