[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20110726191155.95A2659DC9@kinkhorst.com>
Date: Tue, 26 Jul 2011 21:11:55 +0200 (CEST)
From: Thijs Kinkhorst <thijs@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 2286-1] phpmyadmin security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2286-1 security@...ian.org
http://www.debian.org/security/ Thijs Kinkhorst
July 26, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : phpymadmin
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-2505 CVE-2011-2506 CVE-2011-2507
CVE-2011-2508 CVE-2011-2642
Several vulnerabilities were discovered in phpMyAdmin, a tool to
administrate MySQL over the web. The Common Vulnerabilities and
Exposures project identifies the following problems:
CVE-2011-2505
Possible session manipulation in Swekey authentication.
CVE-2011-2506
Possible code injection in setup script, in case session
variables are compromised.
CVE-2011-2507
Regular expression quoting issue in Synchronize code.
CVE-2011-2508
Possible directory traversal in MIME-type transformation.
CVE-2011-2642
Cross site scripting in table Print view when the attacker can
create crafted table names.
No CVE name yet
Possible superglobal and local variables manipulation in
Swekey authentication. (PMASA-2011-12)
The oldstable distribution (lenny) is only affected by CVE-2011-2642,
which has been fixed in version 2.11.8.1-5+lenny9.
For the stable distribution (squeeze), these problems have been fixed
in version 3.3.7-6.
For the testing distribution (wheezy) and unstable distribution (sid),
these problems have been fixed in version 3.4.3.2-1.
We recommend that you upgrade your phpymadmin packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBAgAGBQJOLxE7AAoJEOxfUAG2iX57N88H/AnM44upqiG3cvo+OYiQq/75
K6dmp4s5hUwJNWYgb3ZlqHw3Cbd/+UMvxztpTMXnDpxddn0PPZR3d55dWSZHYKTf
YdKrAwT7rnkpk6Gc6AOqy96XlxbqiqsRO9VVZCWqfiOSQm6wurzl1eQG8CIeuFg4
POsQFPo0AOoSMW1C/Lq0y7eArKJT+sjGdI4pdj32e7xJmWXXaU0IjMFIa/kWDo+p
2tbl6lRw262hEEq7immMETxEVoOe173KpYXpMly01tEKQIYepVXmNtDf2w1LgYWd
/LgI837i/5UvGOlxEXSRpTYqShQZ3SWINWdCAxuR8QRdBh3jO+NA6Sr1MNhCX/E=
=MSqd
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists