From a24567fbc43f221b14e805f9bc0b7c6d16911c46 Mon Sep 17 00:00:00 2001 From: Alex Legler Date: Sun, 8 Mar 2015 22:02:38 +0100 Subject: Import existing advisories --- glsa-201408-01.xml | 59 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 59 insertions(+) create mode 100644 glsa-201408-01.xml (limited to 'glsa-201408-01.xml') diff --git a/glsa-201408-01.xml b/glsa-201408-01.xml new file mode 100644 index 00000000..0f18a1e5 --- /dev/null +++ b/glsa-201408-01.xml @@ -0,0 +1,59 @@ + + + + + + Zend Framework: SQL injection + A vulnerability in Zend Framework could allow a remote attacker to + inject SQL commands. + + ZendFramework + August 04, 2014 + August 04, 2014: 1 + 369139 + remote + + + 1.11.6 + 1.11.6 + + + +

Zend Framework is a high quality and open source framework for + developing Web Applications. +

+
+ +

Developers using non-ASCII-compatible encodings in conjunction with the + MySQL PDO driver of PHP may be vulnerable to SQL injection attacks. +

+
+ +

A remote attacker could use specially crafted input to execute arbitrary + SQL statements. +

+
+ +

There is no known workaround at this time.

+
+ +

All ZendFramework users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-php/ZendFramework-1.11.6" + + +

NOTE: This is a legacy GLSA. Updates for all affected architectures have + been + available since 2011-06-07. It is likely that your system is already + updated + to no longer be affected by this issue. +

+
+ + CVE-2011-1939 + + craig + K_F +
-- cgit v1.2.3-65-gdbad