Resource Management Errors The advisory has been revoked - it doesn't affect any version of package zendframework  (opens in a new tab)


Threat Intelligence

EPSS
0.2% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1804-ZENDFRAMEWORK-671107
  • published13 Feb 2013
  • disclosed13 Feb 2013

Introduced: 13 Feb 2013

CVE-2012-6532  (opens in a new tab)
CWE-399  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:18.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream zendframework package and not the zendframework package as distributed by Ubuntu.

(1) Zend_Dom, (2) Zend_Feed, (3) Zend_Soap, and (4) Zend_XmlRpc in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 allow remote attackers to cause a denial of service (CPU consumption) via recursive or circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity Expansion (XEE) attack.