GLSA-201408-01 : Zend Framework: SQL injection

High Nessus Plugin ID 76996


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-201408-01 (Zend Framework: SQL injection)

Developers using non-ASCII-compatible encodings in conjunction with the MySQL PDO driver of PHP may be vulnerable to SQL injection attacks.
Impact :

A remote attacker could use specially crafted input to execute arbitrary SQL statements.
Workaround :

There is no known workaround at this time.


All ZendFramework users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-php/ZendFramework-1.11.6' NOTE: This is a legacy GLSA. Updates for all affected architectures have been available since 2011-06-07. It is likely that your system is already updated to no longer be affected by this issue.

See Also

Plugin Details

Severity: High

ID: 76996

File Name: gentoo_GLSA-201408-01.nasl

Version: $Revision: 1.3 $

Type: local

Published: 2014/08/05

Modified: 2015/04/13

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:ZendFramework, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/08/04

Reference Information

CVE: CVE-2011-1939

BID: 47919

GLSA: 201408-01