{"id":"UBUNTU-CVE-2012-5657","details":"The (1) Zend_Feed_Rss and (2) Zend_Feed_Atom classes in Zend_Feed in Zend Framework 1.11.x before 1.11.15 and 1.12.x before 1.12.1 allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, and possibly cause a denial of service (CPU and memory consumption) via an XML External Entity (XXE) attack.","modified":"2025-10-24T04:44:58Z","published":"2013-05-02T14:55:00Z","upstream":["CVE-2012-5657"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2012-5657"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2012/12/20/2"},{"type":"REPORT","url":"http://framework.zend.com/security/advisory/ZF2012-05"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=889037"},{"type":"REPORT","url":"http://secunia.com/advisories/51583"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2012-5657"}],"affected":[{"package":{"name":"zend-framework","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/zend-framework@1.11.11-0ubuntu3.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.11.11-0ubuntu2","1.11.11-0ubuntu3","1.11.11-0ubuntu3.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libzend-framework-php","binary_version":"1.11.11-0ubuntu3.16.04.1"},{"binary_name":"libzend-framework-zendx-php","binary_version":"1.11.11-0ubuntu3.16.04.1"},{"binary_name":"zend-framework","binary_version":"1.11.11-0ubuntu3.16.04.1"},{"binary_name":"zend-framework-bin","binary_version":"1.11.11-0ubuntu3.16.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-5657.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}