Lucene search

K
amazonAmazonALAS-2015-560
HistoryJul 07, 2015 - 12:35 p.m.

Medium: php-ZendFramework

2015-07-0712:35:00
alas.aws.amazon.com
16

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.002 Low

EPSS

Percentile

57.4%

Issue Overview:

Upstream reported (http://framework.zend.com/security/advisory/ZF2015-04) a vulnerability in the Zend\Mail component in Zend Framework 2, specifically in how it handles headers. Headers are not correctly filtered for newlines, allowing the ability to send additional, unrelated headers and to bypass additional headers by emitting the header/body separator sequence.

Affected Packages:

php-ZendFramework

Issue Correction:
Run yum update php-ZendFramework to update your system.

New Packages:

noarch:  
    php-ZendFramework-extras-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-demos-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Db-Adapter-Pdo-Mssql-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Pdf-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Cache-Backend-Libmemcached-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Cache-Backend-Memcached-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Serializer-Adapter-Igbinary-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Db-Adapter-Pdo-Pgsql-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Db-Adapter-Pdo-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Captcha-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Ldap-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Search-Lucene-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Dojo-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Db-Adapter-Mysqli-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Auth-Adapter-Ldap-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Feed-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-full-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Cache-Backend-Apc-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Soap-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Services-1.12.13-1.11.amzn1.noarch  
    php-ZendFramework-Db-Adapter-Pdo-Mysql-1.12.13-1.11.amzn1.noarch  
  
src:  
    php-ZendFramework-1.12.13-1.11.amzn1.src  

Additional References

Red Hat: CVE-2015-3154

Mitre: CVE-2015-3154

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.002 Low

EPSS

Percentile

57.4%