CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
78.9%
The (1) Zend_Ldap class in Zend before 1.12.9 and (2) Zend\Ldap component in Zend 2.x before 2.2.8 and 2.3.x before 2.3.3 allows remote attackers to bypass authentication via a password starting with a null byte, which triggers an unauthenticated bind.
Vendor | Product | Version | CPE |
---|---|---|---|
zend | zend_framework | * | cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:* |
zend | zend_framework | 1.12.0 | cpe:2.3:a:zend:zend_framework:1.12.0:*:*:*:*:*:*:* |
zend | zend_framework | 1.12.0 | cpe:2.3:a:zend:zend_framework:1.12.0:rc1:*:*:*:*:*:* |
zend | zend_framework | 1.12.0 | cpe:2.3:a:zend:zend_framework:1.12.0:rc2:*:*:*:*:*:* |
zend | zend_framework | 1.12.0 | cpe:2.3:a:zend:zend_framework:1.12.0:rc3:*:*:*:*:*:* |
zend | zend_framework | 1.12.0 | cpe:2.3:a:zend:zend_framework:1.12.0:rc4:*:*:*:*:*:* |
zend | zend_framework | 1.12.1 | cpe:2.3:a:zend:zend_framework:1.12.1:*:*:*:*:*:*:* |
zend | zend_framework | 1.12.2 | cpe:2.3:a:zend:zend_framework:1.12.2:*:*:*:*:*:*:* |
zend | zend_framework | 1.12.3 | cpe:2.3:a:zend:zend_framework:1.12.3:*:*:*:*:*:*:* |
zend | zend_framework | 1.12.5 | cpe:2.3:a:zend:zend_framework:1.12.5:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2014-October/141070.html
lists.fedoraproject.org/pipermail/package-announce/2014-October/141106.html
www.debian.org/security/2015/dsa-3265
www.openwall.com/lists/oss-security/2014/10/10/5
www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
www.securityfocus.com/bid/70378
exchange.xforce.ibmcloud.com/vulnerabilities/97038