U radu programskog paketa php-ZendFramework uočena je i otklonjena sigurnosna ranjivost. Napadači su je mogli iskoristiti za otkrivanje osjetljivih informacija.
Paket:
php-ZendFramework 1.x
Operacijski sustavi:
Fedora 16, Fedora 17
Kritičnost:
5
Problem:
neodgovarajuća provjera ulaznih podataka, pogreška u programskoj funkciji
Iskorištavanje:
udaljeno
Posljedica:
otkrivanje osjetljivih informacija
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2012-3363
Izvorni ID preporuke:
FEDORA-2012-9979
Izvor:
Fedora
Problem:
Primijećeno je da klasa "SimpleXMLElement" na neodgovarajući način obrađuje XML podatke unutar XML-RPC poziva.
Posljedica:
Zloćudni napadači mogu iskoristiti propust kako bi saznali potencijalno osjetljive podatke.
Rješenje:
Rješenje problema sigurnosti je primjena programskih zakrpa proizvođača.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-9979
2012-06-28 02:40:09
--------------------------------------------------------------------------------
Name : php-ZendFramework
Product : Fedora 17
Version : 1.11.12
Release : 1.fc17
URL : http://framework.zend.com/
Summary : Leading open-source PHP framework
Description :
Extending the art & spirit of PHP, Zend Framework is based on simplicity,
object-oriented best practices, corporate friendly licensing, and a rigorously
tested agile code base. Zend Framework is focused on building more secure,
reliable, and modern Web 2.0 applications & web services, and consuming widely
available APIs from leading vendors like Google, Amazon, Yahoo!, Flickr, as
well as API providers and catalogers like StrikeIron and ProgrammableWeb.
--------------------------------------------------------------------------------
Update Information:
Update to 1.11.12 which fixes security issue ZF2012-01: Local file disclosure
via XXE injection in Zend_XmlRpc
--------------------------------------------------------------------------------
ChangeLog:
* Tue Jun 26 2012 Felix Kaechele <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.11.12-1
- update to 1.11.12
- fixes ZF2012-01: Local file disclosure via XXE injection in Zend_XmlRpc
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #835560 - CVE-2012-3363 php-ZendFramework: File disclosure via XXE
injection in Zend_XMLRPC (ZF2012-01)
https://bugzilla.redhat.com/show_bug.cgi?id=835560
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update php-ZendFramework' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-9978
2012-06-28 02:40:07
--------------------------------------------------------------------------------
Name : php-ZendFramework
Product : Fedora 16
Version : 1.11.12
Release : 1.fc16
URL : http://framework.zend.com/
Summary : Leading open-source PHP framework
Description :
Extending the art & spirit of PHP, Zend Framework is based on simplicity,
object-oriented best practices, corporate friendly licensing, and a rigorously
tested agile code base. Zend Framework is focused on building more secure,
reliable, and modern Web 2.0 applications & web services, and consuming widely
available APIs from leading vendors like Google, Amazon, Yahoo!, Flickr, as
well as API providers and catalogers like StrikeIron and ProgrammableWeb.
--------------------------------------------------------------------------------
Update Information:
Update to 1.11.12 which fixes security issue ZF2012-01: Local file disclosure
via XXE injection in Zend_XmlRpc
--------------------------------------------------------------------------------
ChangeLog:
* Tue Jun 26 2012 Felix Kaechele <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.11.12-1
- update to 1.11.12
- fixes ZF2012-01: Local file disclosure via XXE injection in Zend_XmlRpc
* Sat Jan 14 2012 Fedora Release Engineering <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> -
1.11.11-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
* Fri Oct 14 2011 Felix Kaechele <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.11.11-1
- update to 1.11.11
- full changelog http://framework.zend.com/changelog/1.11.11
- spec cleanup
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #835560 - CVE-2012-3363 php-ZendFramework: File disclosure via XXE
injection in Zend_XMLRPC (ZF2012-01)
https://bugzilla.redhat.com/show_bug.cgi?id=835560
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update php-ZendFramework' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke