Executive Summary

Informations
Name MDVSA-2013:115 First vendor Publication 2013-04-10
Vendor Mandriva Last vendor Modification 2013-04-10
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Updated php-ZendFramework packages fix security vulnerabilities:

Zend_Dom, Zend_Feed, Zend_Soap, and Zend_XmlRpc in Zend Framework before 1.11.13 and 1.12.0 are vulnerable to XML Entity Expansion (XEE) vectors, leading to Denial of Service vectors. XEE attacks occur when the XML DOCTYPE declaration includes XML entity definitions that contain either recursive or circular references; this leads to CPU and memory consumption, making Denial of Service exploits trivial to implement (ZF2012-02).

A vulnerability was reported in Zend Framework versions prior to 1.11.15 and 1.12.1, which can be exploited to disclose certain sensitive information. This flaw is caused due to an error in the Zend_Feed_Rss and Zend_Feed_Atom classes of the Zend_Feed component, when processing XML data. It can be used to disclose the contents of certain local files by sending specially crafted XML data including external entity references (CVE-2012-5657, ZF2012-05).

Original Source

Url : http://www.mandriva.com/security/advisories?name=MDVSA-2013:115

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-399 Resource Management Errors
50 % CWE-200 Information Exposure

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:20156
 
Oval ID: oval:org.mitre.oval:def:20156
Title: DSA-2602-1 zendframework - XML external entity inclusion
Description: Yury Dyachenko discovered that Zend Framework uses the PHP XML parser in an insecure way, allowing attackers to open files and trigger HTTP requests, potentially accessing restricted information.
Family: unix Class: patch
Reference(s): DSA-2602-1
CVE-2012-5657
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): zendframework
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 61

Nessus® Vulnerability Scanner

Date Description
2015-06-22 Name : The remote Debian host is missing a security update.
File : debian_DLA-251.nasl - Type : ACT_GATHER_INFO
2015-05-21 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3265.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2013-153.nasl - Type : ACT_GATHER_INFO
2013-04-20 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-115.nasl - Type : ACT_GATHER_INFO
2013-01-21 Name : The remote Fedora host is missing a security update.
File : fedora_2013-0057.nasl - Type : ACT_GATHER_INFO
2013-01-21 Name : The remote Fedora host is missing a security update.
File : fedora_2013-0061.nasl - Type : ACT_GATHER_INFO
2013-01-21 Name : The remote Fedora host is missing a security update.
File : fedora_2013-0063.nasl - Type : ACT_GATHER_INFO
2013-01-09 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2602.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
Date Informations
2016-04-27 01:44:22
  • Multiple Updates
2014-02-17 11:43:39
  • Multiple Updates
2013-05-11 00:49:11
  • Multiple Updates
2013-05-06 21:21:21
  • Multiple Updates
2013-05-04 17:21:11
  • Multiple Updates
2013-05-03 17:20:24
  • Multiple Updates
2013-05-02 21:20:21
  • Multiple Updates
2013-04-10 17:18:26
  • First insertion