Lucene search

K
cve[email protected]CVE-2012-6532
HistoryFeb 13, 2013 - 5:55 p.m.

CVE-2012-6532

2013-02-1317:55:01
CWE-399
web.nvd.nist.gov
37
cve
zend framework
denial of service
xee attack
xml entity expansion
security vulnerability

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

8.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.8%

(1) Zend_Dom, (2) Zend_Feed, (3) Zend_Soap, and (4) Zend_XmlRpc in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 allow remote attackers to cause a denial of service (CPU consumption) via recursive or circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity Expansion (XEE) attack.

Affected configurations

NVD
Node
zendzend_frameworkMatch1.0.4
OR
zendzend_frameworkMatch1.5.0
OR
zendzend_frameworkMatch1.5.1
OR
zendzend_frameworkMatch1.5.2
OR
zendzend_frameworkMatch1.5.3
OR
zendzend_frameworkMatch1.6.0
OR
zendzend_frameworkMatch1.6.1
OR
zendzend_frameworkMatch1.6.2
OR
zendzend_frameworkMatch1.7.0
OR
zendzend_frameworkMatch1.7.1
OR
zendzend_frameworkMatch1.7.2
OR
zendzend_frameworkMatch1.7.3
OR
zendzend_frameworkMatch1.7.4
OR
zendzend_frameworkMatch1.7.5
OR
zendzend_frameworkMatch1.7.6
OR
zendzend_frameworkMatch1.7.7
OR
zendzend_frameworkMatch1.7.8
OR
zendzend_frameworkMatch1.7.9
OR
zendzend_frameworkMatch1.8.0
OR
zendzend_frameworkMatch1.8.1
OR
zendzend_frameworkMatch1.8.2
OR
zendzend_frameworkMatch1.8.3
OR
zendzend_frameworkMatch1.8.4
OR
zendzend_frameworkMatch1.8.5
OR
zendzend_frameworkMatch1.9.0
OR
zendzend_frameworkMatch1.9.1
OR
zendzend_frameworkMatch1.9.2
OR
zendzend_frameworkMatch1.9.3
OR
zendzend_frameworkMatch1.9.4
OR
zendzend_frameworkMatch1.9.5
OR
zendzend_frameworkMatch1.9.6
OR
zendzend_frameworkMatch1.9.7
OR
zendzend_frameworkMatch1.9.8
OR
zendzend_frameworkMatch1.10.0
OR
zendzend_frameworkMatch1.10.1
OR
zendzend_frameworkMatch1.10.2
OR
zendzend_frameworkMatch1.10.3
OR
zendzend_frameworkMatch1.10.4
OR
zendzend_frameworkMatch1.10.5
OR
zendzend_frameworkMatch1.10.6
OR
zendzend_frameworkMatch1.10.7
OR
zendzend_frameworkMatch1.10.8
OR
zendzend_frameworkMatch1.11.0
OR
zendzend_frameworkMatch1.11.1
OR
zendzend_frameworkMatch1.11.2
OR
zendzend_frameworkMatch1.11.3
OR
zendzend_frameworkMatch1.11.4
OR
zendzend_frameworkMatch1.11.5
OR
zendzend_frameworkMatch1.11.6
OR
zendzend_frameworkMatch1.11.7
OR
zendzend_frameworkMatch1.11.8
OR
zendzend_frameworkMatch1.11.9
OR
zendzend_frameworkMatch1.11.10
OR
zendzend_frameworkMatch1.11.11
OR
zendzend_frameworkMatch1.11.12
OR
zendzend_frameworkMatch1.12.0rc1
OR
zendzend_frameworkMatch1.12.0rc2
OR
zendzend_frameworkMatch1.12.0rc3
OR
zendzend_frameworkMatch1.12.0rc4

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

8.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.8%