UBUNTU-CVE-2015-3154

Source
https://ubuntu.com/security/CVE-2015-3154
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-3154.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2015-3154
Upstream
  • CVE-2015-3154
Published
2020-01-27T16:15:00Z
Modified
2025-10-24T04:45:21Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.

References

Affected packages

Ubuntu:16.04:LTS / zend-framework

Package

Name
zend-framework
Purl
pkg:deb/ubuntu/zend-framework@1.11.11-0ubuntu3.16.04.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.11.11-0ubuntu2
1.11.11-0ubuntu3
1.11.11-0ubuntu3.16.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.11.11-0ubuntu3.16.04.1",
            "binary_name": "libzend-framework-php"
        },
        {
            "binary_version": "1.11.11-0ubuntu3.16.04.1",
            "binary_name": "libzend-framework-zendx-php"
        },
        {
            "binary_version": "1.11.11-0ubuntu3.16.04.1",
            "binary_name": "zend-framework"
        },
        {
            "binary_version": "1.11.11-0ubuntu3.16.04.1",
            "binary_name": "zend-framework-bin"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-3154.json"