CVE-2014-2685

NameCVE-2014-2685
DescriptionThe GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 violate the OpenID 2.0 protocol by ensuring only that at least one field is signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-251-1, DSA-3265-1
NVD severityhigh (attack range: remote)
Debian Bugs743175

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
zendframework (PTS)wheezy1.11.13-1.1+deb7u6fixed
wheezy (security)1.11.13-1.1+deb7u5fixed
jessie1.12.9+dfsg-2+deb8u6fixed
jessie (security)1.12.9+dfsg-2+deb8u4fixed
sid1.12.20+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
zendframeworksource(unstable)1.12.5-0.1high743175
zendframeworksourcesqueeze1.10.6-1squeeze3highDLA-251-1
zendframeworksourcewheezy1.11.13-1.1+deb7u1highDSA-3265-1

Notes

http://framework.zend.com/security/advisory/ZF2014-02

Search for package or bug name: Reporting problems