Updated php-ZendFramework packages fix security vulnerabilities
Publication date: 29 Oct 2014Modification date: 29 Oct 2014
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-8088 , CVE-2014-8089
Description
Due to a bug in PHP's LDAP extension, when ZendFramework's Zend_ldap class is used for logins, an attacker can login as any user by using a null byte to bypass the empty password check and perform an unauthenticated LDAP bind (CVE-2014-8088). The sqlsrv PHP extension, which provides the ability to connect to Microsoft SQL Server from PHP, does not provide a built-in quoting mechanism for manually quoting values to pass via SQL queries; developers are encouraged to use prepared statements. Zend Framework provides quoting mechanisms via Zend_Db_Adapter_Sqlsrv which uses the recommended "double single quote" ('') as quoting delimiters. SQL Server treats null bytes in a query as a string terminator, allowing an attacker to add arbitrary SQL following a null byte, and thus create a SQL injection (CVE-2014-8089).
References
- https://bugs.mageia.org/show_bug.cgi?id=14253
- http://framework.zend.com/security/advisory/ZF2014-05
- http://framework.zend.com/security/advisory/ZF2014-06
- http://framework.zend.com/blog/zend-framework-1-12-9-2-2-8-and-2-3-3-released.html
- https://lists.fedoraproject.org/pipermail/package-announce/2014-October/141106.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8089
SRPMS
3/core
- php-ZendFramework-1.12.9-1.mga3
4/core
- php-ZendFramework-1.12.9-1.mga4