Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2013:115 | First vendor Publication | 2013-04-10 |
Vendor | Mandriva | Last vendor Modification | 2013-04-10 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Updated php-ZendFramework packages fix security vulnerabilities: Zend_Dom, Zend_Feed, Zend_Soap, and Zend_XmlRpc in Zend Framework before 1.11.13 and 1.12.0 are vulnerable to XML Entity Expansion (XEE) vectors, leading to Denial of Service vectors. XEE attacks occur when the XML DOCTYPE declaration includes XML entity definitions that contain either recursive or circular references; this leads to CPU and memory consumption, making Denial of Service exploits trivial to implement (ZF2012-02). A vulnerability was reported in Zend Framework versions prior to 1.11.15 and 1.12.1, which can be exploited to disclose certain sensitive information. This flaw is caused due to an error in the Zend_Feed_Rss and Zend_Feed_Atom classes of the Zend_Feed component, when processing XML data. It can be used to disclose the contents of certain local files by sending specially crafted XML data including external entity references (CVE-2012-5657, ZF2012-05). |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2013:115 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-399 | Resource Management Errors |
50 % | CWE-200 | Information Exposure |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20156 | |||
Oval ID: | oval:org.mitre.oval:def:20156 | ||
Title: | DSA-2602-1 zendframework - XML external entity inclusion | ||
Description: | Yury Dyachenko discovered that Zend Framework uses the PHP XML parser in an insecure way, allowing attackers to open files and trigger HTTP requests, potentially accessing restricted information. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2602-1 CVE-2012-5657 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | zendframework |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-06-22 | Name : The remote Debian host is missing a security update. File : debian_DLA-251.nasl - Type : ACT_GATHER_INFO |
2015-05-21 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3265.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-153.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-115.nasl - Type : ACT_GATHER_INFO |
2013-01-21 | Name : The remote Fedora host is missing a security update. File : fedora_2013-0057.nasl - Type : ACT_GATHER_INFO |
2013-01-21 | Name : The remote Fedora host is missing a security update. File : fedora_2013-0061.nasl - Type : ACT_GATHER_INFO |
2013-01-21 | Name : The remote Fedora host is missing a security update. File : fedora_2013-0063.nasl - Type : ACT_GATHER_INFO |
2013-01-09 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2602.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-27 01:44:22 |
|
2014-02-17 11:43:39 |
|
2013-05-11 00:49:11 |
|
2013-05-06 21:21:21 |
|
2013-05-04 17:21:11 |
|
2013-05-03 17:20:24 |
|
2013-05-02 21:20:21 |
|
2013-04-10 17:18:26 |
|