{"id":"UBUNTU-CVE-2014-8088","details":"The (1) Zend_Ldap class in Zend before 1.12.9 and (2) Zend\\Ldap component in Zend 2.x before 2.2.8 and 2.3.x before 2.3.3 allows remote attackers to bypass authentication via a password starting with a null byte, which triggers an unauthenticated bind.","modified":"2025-10-24T04:45:13Z","published":"2014-10-22T14:55:00Z","upstream":["CVE-2014-8088"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-8088"},{"type":"REPORT","url":"http://framework.zend.com/security/advisory/ZF2014-05"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2014/10/10"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-8088"}],"affected":[{"package":{"name":"zend-framework","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/zend-framework@1.11.11-0ubuntu3.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.11.11-0ubuntu2","1.11.11-0ubuntu3","1.11.11-0ubuntu3.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libzend-framework-php","binary_version":"1.11.11-0ubuntu3.16.04.1"},{"binary_name":"libzend-framework-zendx-php","binary_version":"1.11.11-0ubuntu3.16.04.1"},{"binary_name":"zend-framework","binary_version":"1.11.11-0ubuntu3.16.04.1"},{"binary_name":"zend-framework-bin","binary_version":"1.11.11-0ubuntu3.16.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-8088.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}