[pkg-php-pear] Bug#850215: Bug#850215: zendframework: CVE-2016-10034
Markus Frosch
lazyfrosch at debian.org
Thu Jan 5 09:34:29 UTC 2017
On 05.01.2017 07:01, Salvatore Bonaccorso wrote:
> Source: zendframework
> Version: 1.12.9+dfsg-1
> Severity: grave
> Tags: upstream security
> Justification: user security hole
>
> Hi,
>
> the following vulnerability was published for zendframework.
>
> CVE-2016-10034[0]:
> | The setFrom function in the Sendmail adapter in the zend-mail
> | component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and
> | Zend Framework before 2.4.11 might allow remote attackers to pass
> | extra parameters to the mail command and consequently execute
> | arbitrary code via a \" (backslash double quote) in a crafted e-mail
> | address.
>
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
>
> For further information see:
>
> [0] https://security-tracker.debian.org/tracker/CVE-2016-10034
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10034
>
> Please adjust the affected versions in the BTS as needed.
Hi Salvatore,
thanks for bringing that up.
I actually don't think this CVE is valid for ZendFramework 1 (Version < 2).
Not only there are big differences in class structure between ZF1 and ZF >= 2.0,
but many features have been introduced first in ZF > 2.
I see no specific handling for a From header in Zend_Mail_Transport_Sendmail.
https://github.com/zendframework/zf1/blob/master/library/Zend/Mail/Transport/Sendmail.php#L128
A user of the library would be able to insert additional parameters, and pass whatever
argument to sendmail. But the user would have to care about securing / escaping then.
As we currently don't have a package for Zend-Mail, and zendframework is < 2, this bug
wouldn't affect Debian.
Would love if someone could approve or object my analysis.
Cheers
Markus Frosch
--
markus at lazyfrosch.de / lazyfrosch at debian.org
http://www.lazyfrosch.de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-php-pear/attachments/20170105/ad06b00d/attachment.sig>
More information about the pkg-php-pear
mailing list