From owner-svn-ports-head@FreeBSD.ORG Tue Oct 16 14:37:51 2012 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 50A5A337; Tue, 16 Oct 2012 14:37:51 +0000 (UTC) (envelope-from glarkin@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:4f8:fff6::2c]) by mx1.freebsd.org (Postfix) with ESMTP id 1AEC18FC0A; Tue, 16 Oct 2012 14:37:51 +0000 (UTC) Received: from svn.freebsd.org (localhost [127.0.0.1]) by svn.freebsd.org (8.14.4/8.14.4) with ESMTP id q9GEboI0059430; Tue, 16 Oct 2012 14:37:50 GMT (envelope-from glarkin@svn.freebsd.org) Received: (from glarkin@localhost) by svn.freebsd.org (8.14.4/8.14.4/Submit) id q9GEbom8059428; Tue, 16 Oct 2012 14:37:50 GMT (envelope-from glarkin@svn.freebsd.org) Message-Id: <201210161437.q9GEbom8059428@svn.freebsd.org> From: Greg Larkin Date: Tue, 16 Oct 2012 14:37:50 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r305978 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Oct 2012 14:37:51 -0000 Author: glarkin Date: Tue Oct 16 14:37:50 2012 New Revision: 305978 URL: http://svn.freebsd.org/changeset/ports/305978 Log: - Updated ZF advisory to include similar XEE vulnerability Feature safe: yes Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Oct 16 14:33:07 2012 (r305977) +++ head/security/vuxml/vuln.xml Tue Oct 16 14:37:50 2012 (r305978) @@ -52,17 +52,17 @@ Note: Please add new entries to the beg --> - Zend Framework -- Local file disclosure via XXE injection + Zend Framework -- Multiple vulnerabilities via XXE injection ZendFramework - 1.11.12 + 1.11.13 -

K. Gudinavicius reports:

-
+

The Zend Framework team reports:

+

The XmlRpc package of Zend Framework is vulnerable to XML eXternal Entity Injection attacks (both server and client). The SimpleXMLElement class (SimpleXML PHP extension) is used @@ -70,6 +70,13 @@ Note: Please add new entries to the beg specified by adding a specific DOCTYPE element to XML-RPC requests. By exploiting this vulnerability an application may be coerced to open arbitrary files and/or TCP connections.

+

Additionally, the Zend_Dom, Zend_Feed, Zend_Soap, and + Zend_XmlRpc components are vulnerable to XML Entity Expansion + (XEE) vectors, leading to Denial of Service vectors. XEE attacks + occur when the XML DOCTYPE declaration includes XML entity + definitions that contain either recursive or circular references; + this leads to CPU and memory consumption, making Denial of + Service exploits trivial to implement.

@@ -77,6 +84,7 @@ Note: Please add new entries to the beg CVE-2012-3363 https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt http://framework.zend.com/security/advisory/ZF2012-01 + http://framework.zend.com/security/advisory/ZF2012-02 http://www.openwall.com/lists/oss-security/2012/06/26/2 https://secunia.com/advisories/49665/