Resolved Bugs
1215712 – CVE-2015-3154 php-ZendFramework2: ZF2015-04: Potential header and mail injection vulnerability
1223762 – CVE-2015-3154 php-ZendFramework: php-ZendFramework2: ZF2015-04: Potential header and mail injection vulnerability [fedora-all]<br
**Zend Framework 1.12.13**
* 567: Cast int and float to string when creating headers
**Zend Framework 1.12.12**
* 493: PHPUnit not being installed
* 511: Add PATCH to the list of allowed methods in Zend_Controller_Request_HttpTestCase
* 513: Save time and space when cloning PHPUnit
* 515: !IE conditional comments bug
* 516: Zend_Locale does not honor parentLocale configuration
* 518: Run travis build also on PHP 7 builds
* 534: Failing unit test: Zend_Validate_EmailAddressTest::testIdnHostnameInEmaillAddress
* 536: Zend_Measure_Number convert some decimal numbers to roman with space char
* 537: Extend view renderer controller fix (#440)
* 540: Fix PHP 7 BC breaks in Zend_XmlRpc/Amf_Server
* 541: Fixed errors in tests on PHP7
* 542: Correctly reset the sub-path when processing routes
* 545: Fixed path delimeters being stripped by chain routes affecting later routes
* 546: TravisCI: Skip memcache(d) on PHP 5.2
* 547: Session Validators throw ‘general’ Session Exception during Session start
* 550: Notice “Undefined index: browser_version”
* 557: doc: Zend Framework Dependencies table unreadable
* 559: Fixes a typo in Zend_Validate messages for SK
* 561: Zend_Date not expected year
* 564: Zend_Application tries to load ZendX_Application_Resource_FrontController during instantiation
**Security**
* **ZF2015-04**: Zend_Mail and Zend_Http were both susceptible to CRLF Injection Attack vectors (for HTTP, this is often referred to as HTTP Response Splitting). Both components were updated to perform header value validations to ensure no values contain characters not detailed in their corresponding specifications, and will raise exceptions on detection. Each also provides new facilities for both validating and filtering header values prior to injecting them into header classes. If you use either Zend_Mail or Zend_Http, we recommend upgrading immediately.
Monthly Archives: May 2015
Fedora 21 Security Update: netty-4.0.28-1.fc21
Fedora 20 Security Update: php-ZendFramework-1.12.13-1.fc20
Resolved Bugs
1215712 – CVE-2015-3154 php-ZendFramework2: ZF2015-04: Potential header and mail injection vulnerability
1223762 – CVE-2015-3154 php-ZendFramework: php-ZendFramework2: ZF2015-04: Potential header and mail injection vulnerability [fedora-all]<br
**Zend Framework 1.12.13**
* 567: Cast int and float to string when creating headers
**Zend Framework 1.12.12**
* 493: PHPUnit not being installed
* 511: Add PATCH to the list of allowed methods in Zend_Controller_Request_HttpTestCase
* 513: Save time and space when cloning PHPUnit
* 515: !IE conditional comments bug
* 516: Zend_Locale does not honor parentLocale configuration
* 518: Run travis build also on PHP 7 builds
* 534: Failing unit test: Zend_Validate_EmailAddressTest::testIdnHostnameInEmaillAddress
* 536: Zend_Measure_Number convert some decimal numbers to roman with space char
* 537: Extend view renderer controller fix (#440)
* 540: Fix PHP 7 BC breaks in Zend_XmlRpc/Amf_Server
* 541: Fixed errors in tests on PHP7
* 542: Correctly reset the sub-path when processing routes
* 545: Fixed path delimeters being stripped by chain routes affecting later routes
* 546: TravisCI: Skip memcache(d) on PHP 5.2
* 547: Session Validators throw ‘general’ Session Exception during Session start
* 550: Notice “Undefined index: browser_version”
* 557: doc: Zend Framework Dependencies table unreadable
* 559: Fixes a typo in Zend_Validate messages for SK
* 561: Zend_Date not expected year
* 564: Zend_Application tries to load ZendX_Application_Resource_FrontController during instantiation
**Security**
* **ZF2015-04**: Zend_Mail and Zend_Http were both susceptible to CRLF Injection Attack vectors (for HTTP, this is often referred to as HTTP Response Splitting). Both components were updated to perform header value validations to ensure no values contain characters not detailed in their corresponding specifications, and will raise exceptions on detection. Each also provides new facilities for both validating and filtering header values prior to injecting them into header classes. If you use either Zend_Mail or Zend_Http, we recommend upgrading immediately.
Fedora 21 Security Update: ufraw-0.21-1.fc21
Resolved Bugs
1221249 – CVE-2015-3885 dcraw: input sanitization flaw leading to buffer overflow
1221258 – CVE-2015-3885 ufraw: dcraw: input sanitization flaw leading to buffer overflow [fedora-all]<br
This update contains a fix for a bug which could cause dcraw write past array boundaries.
Additionally, it updates ufraw to version 0.21, an upstream bugfix release.
Adult dating site hacked, leaking private information
Casual dating website ‘Adult FriendFinder’ has been hacked, leaking data from as many as 3.9 million accounts, according to an investigation by Channel 4 News.
The post Adult dating site hacked, leaking private information appeared first on We Live Security.
![]()
Millions of Android Phones Fail to Purge Data
That basically means that your login data, mails, contacts, SMS, images, and videos can be retrieved at least partially. Not even a Full-disk encryption is of much help here: The flawed Android factory reset leaves behind enough data for the key to be recovered.
The study unveils five critical failures:
- “The lack of Android support for proper deletion of the data partition in v2.3.x devices
- The incompleteness of upgrades pushed to flawed devices by vendors
- The lack of driver support for proper deletion shipped by vendors in newer devices (e.g. on v4.[1,2,3])
- The lack of Android support for proper deletion of the internal and external SD card in all OS versions
- The fragility of full-disk encryption to mitigate those problems up to Android v4.4 (KitKat)”
The researcher examined 21 Android phones that used version 2.3.x to 4.3 of the OS and were sold by five different vendors. Apart from being able to recover said data, they could also recover Google authentication tokens: “We recovered Google tokens in all devices with flawed Factory Reset, and the master token 80 percent of the time. Tokens for other apps such as Facebook can be recovered similarly. We stress that we have never attempted to use those tokens to access anyone’s account.”
So what to do if you want to sell your mobile? The study recommends filling up the partition of interest with random-byte files, to overwrite all unallocated space. In order for this to work you would have to install the third-party app that would fill the partition manually though because otherwise the Google credentials stored on the file system would not be erased.
Take a look at the study to find out more.
The post Millions of Android Phones Fail to Purge Data appeared first on Avira Blog.
WordPress WP Membership 1.2.3 Privilege Escalation
WordPress WP Membership plugin version 1.2.3 suffers from a privilege escalation vulnerability.
HP Security Bulletin HPSBMU03336
HP Security Bulletin HPSBMU03336 – A potential security vulnerability has identified with HP Helion OpenStack. The vulnerability could be exploited resulting in Denial of Service (DoS) or execution of arbitrary code. Revision 1 of this advisory.
WordPress WP Membership 1.2.3 Cross Site Scripting
WordPress WP Membership plugin version 1.2.3 suffers from a stored cross site scripting vulnerability.
Apple bolsters app store security with 2FA and Touch ID
A new update to the Apple Store app for iPhone and iPad has bolstered its security features, adding two-factor authentication (2FA) and increased Touch ID support.
The post Apple bolsters app store security with 2FA and Touch ID appeared first on We Live Security.
![]()