Debian: DSA-2602-1: zendframework security update
Debian: DSA-2602-1: zendframework security update
Yury Dyachenko discovered that Zend Framework uses the PHP XML parser in an insecure way, allowing attackers to open files and trigger HTTP requests, potentially accessing restricted information.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2602-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Florian Weimer January 08, 2013 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : zendframework Vulnerability : XML external entity inclusion Problem type : remote Debian-specific: no CVE ID : CVE-2012-5657 Debian Bug : 696483 Yury Dyachenko discovered that Zend Framework uses the PHP XML parser in an insecure way, allowing attackers to open files and trigger HTTP requests, potentially accessing restricted information. For the stable distribution (squeeze), this problem has been fixed in version 1.10.6-1squeeze2. For the testing distribution (wheezy), this problem has been fixed in version 1.11.13-1.1. For the unstable distribution (sid), this problem has been fixed in version 1.11.13-1.1. We recommend that you upgrade your zendframework packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.