Mandriva Linux Security Advisory : php-ZendFramework (MDVSA-2015:097)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Updated php-ZendFramework packages fix multiple vulnerabilities :

XML eXternal Entity (XXE) and XML Entity Expansion (XEE) flaws were
discovered in the Zend Framework. An attacker could use these flaws to
cause a denial of service, access files accessible to the server
process, or possibly perform other more advanced XML External Entity
(XXE) attacks (CVE-2014-2681, CVE-2014-2682, CVE-2014-2683).

Using the Consumer component of Zend_OpenId, it is possible to login
using an arbitrary OpenID account (without knowing any secret
information) by using a malicious OpenID Provider. That means OpenID
it is possible to login using arbitrary OpenID Identity (MyOpenID,
Google, etc), which are not under the control of our own OpenID
Provider. Thus, we are able to impersonate any OpenID Identity against
the framework (CVE-2014-2684, CVE-2014-2685).

The implementation of the ORDER BY SQL statement in Zend_Db_Select of
Zend Framework 1 contains a potential SQL injection when the query
string passed contains parentheses (CVE-2014-4914).

Due to a bug in PHP's LDAP extension, when ZendFramework's Zend_ldap
class is used for logins, an attacker can login as any user by using a
null byte to bypass the empty password check and perform an
unauthenticated LDAP bind (CVE-2014-8088).

The sqlsrv PHP extension, which provides the ability to connect to
Microsoft SQL Server from PHP, does not provide a built-in quoting
mechanism for manually quoting values to pass via SQL queries;
developers are encouraged to use prepared statements. Zend Framework
provides quoting mechanisms via Zend_Db_Adapter_Sqlsrv which uses the
recommended double single quote ('') as quoting delimiters. SQL Server
treats null bytes in a query as a string terminator, allowing an
attacker to add arbitrary SQL following a null byte, and thus create a
SQL injection (CVE-2014-8089).

See also :

http://advisories.mageia.org/MGASA-2014-0151.html
http://advisories.mageia.org/MGASA-2014-0311.html
http://advisories.mageia.org/MGASA-2014-0434.html

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 82350 ()

Bugtraq ID:

CVE ID: CVE-2014-2681
CVE-2014-2682
CVE-2014-2683
CVE-2014-2684
CVE-2014-2685
CVE-2014-4914
CVE-2014-8088
CVE-2014-8089

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now