On 05.01.2017 07:01, Salvatore Bonaccorso wrote: > Source: zendframework > Version: 1.12.9+dfsg-1 > Severity: grave > Tags: upstream security > Justification: user security hole > > Hi, > > the following vulnerability was published for zendframework. > > CVE-2016-10034[0]: > | The setFrom function in the Sendmail adapter in the zend-mail > | component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and > | Zend Framework before 2.4.11 might allow remote attackers to pass > | extra parameters to the mail command and consequently execute > | arbitrary code via a \" (backslash double quote) in a crafted e-mail > | address. > > If you fix the vulnerability please also make sure to include the > CVE (Common Vulnerabilities & Exposures) id in your changelog entry. > > For further information see: > > [0] https://security-tracker.debian.org/tracker/CVE-2016-10034 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10034 > > Please adjust the affected versions in the BTS as needed.
Hi Salvatore, thanks for bringing that up. I actually don't think this CVE is valid for ZendFramework 1 (Version < 2). Not only there are big differences in class structure between ZF1 and ZF >= 2.0, but many features have been introduced first in ZF > 2. I see no specific handling for a From header in Zend_Mail_Transport_Sendmail. https://github.com/zendframework/zf1/blob/master/library/Zend/Mail/Transport/Sendmail.php#L128 A user of the library would be able to insert additional parameters, and pass whatever argument to sendmail. But the user would have to care about securing / escaping then. As we currently don't have a package for Zend-Mail, and zendframework is < 2, this bug wouldn't affect Debian. Would love if someone could approve or object my analysis. Cheers Markus Frosch -- [email protected] / [email protected] http://www.lazyfrosch.de
signature.asc
Description: OpenPGP digital signature

