Name | CVE-2014-4914 |
Description | The Zend_Db_Select::order function in Zend Framework before 1.12.7 does not properly handle parentheses, which allows remote attackers to conduct SQL injection attacks via unspecified vectors. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-251-1, DSA-3265-1 |
Debian Bugs | 754201 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
zendframework | source | squeeze | 1.10.6-1squeeze3 | DLA-251-1 | ||
zendframework | source | wheezy | 1.11.13-1.1+deb7u1 | DSA-3265-1 | ||
zendframework | source | (unstable) | 1.12.7-0.1 | 754201 |
http://framework.zend.com/security/advisory/ZF2014-04
https://github.com/zendframework/zf1/commit/da09186c60b9168520e994af4253fba9c19c2b3d