First published: Fri Dec 30 2016(Updated: )
The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/zendframework/zend-mail | >=2.7<2.7.2 | 2.7.2 |
composer/zendframework/zend-mail | >=2.6<=2.6.2 | |
composer/zendframework/zend-mail | >=2.5<=2.5.2 | |
composer/zendframework/zend-mail | <2.4.11 | 2.4.11 |
Zend Framework | <=2.4.10 | |
Zend Mail | <=2.4.10 | |
Zend Mail | =2.5.0 | |
Zend Mail | =2.5.1 | |
Zend Mail | =2.5.2 | |
Zend Mail | =2.6.0 | |
Zend Mail | =2.6.1 | |
Zend Mail | =2.6.2 | |
Zend Mail | =2.7.0 | |
Zend Mail | =2.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10034 has been rated as a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2016-10034, upgrade to zend-mail version 2.7.2 or later, or zend-framework version 2.4.11 or later.
CVE-2016-10034 affects zend-mail versions prior to 2.7.2, zend-framework versions before 2.4.11, and several specific versions of zend-mail and framework components.
Attackers can exploit CVE-2016-10034 to pass extra parameters to the mail command, which may allow them to execute arbitrary code.
CVE-2016-10034 was disclosed in April 2016.