GLSA-201408-01 : Zend Framework: SQL injection

critical Nessus Plugin ID 76996

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-201408-01 (Zend Framework: SQL injection)

Developers using non-ASCII-compatible encodings in conjunction with the MySQL PDO driver of PHP may be vulnerable to SQL injection attacks.
Impact :

A remote attacker could use specially crafted input to execute arbitrary SQL statements.
Workaround :

There is no known workaround at this time.

Solution

All ZendFramework users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-php/ZendFramework-1.11.6' NOTE: This is a legacy GLSA. Updates for all affected architectures have been available since 2011-06-07. It is likely that your system is already updated to no longer be affected by this issue.

See Also

https://security.gentoo.org/glsa/201408-01

Plugin Details

Severity: Critical

ID: 76996

File Name: gentoo_GLSA-201408-01.nasl

Version: 1.7

Type: local

Published: 8/5/2014

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:zendframework, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/4/2014

Vulnerability Publication Date: 11/26/2019

Reference Information

CVE: CVE-2011-1939

BID: 47919

GLSA: 201408-01