-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2286-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst July 26, 2011 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : phpymadmin Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2011-2505 CVE-2011-2506 CVE-2011-2507 CVE-2011-2508 CVE-2011-2642 Several vulnerabilities were discovered in phpMyAdmin, a tool to administrate MySQL over the web. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-2505 Possible session manipulation in Swekey authentication. CVE-2011-2506 Possible code injection in setup script, in case session variables are compromised. CVE-2011-2507 Regular expression quoting issue in Synchronize code. CVE-2011-2508 Possible directory traversal in MIME-type transformation. CVE-2011-2642 Cross site scripting in table Print view when the attacker can create crafted table names. No CVE name yet Possible superglobal and local variables manipulation in Swekey authentication. (PMASA-2011-12) The oldstable distribution (lenny) is only affected by CVE-2011-2642, which has been fixed in version 2.11.8.1-5+lenny9. For the stable distribution (squeeze), these problems have been fixed in version 3.3.7-6. For the testing distribution (wheezy) and unstable distribution (sid), these problems have been fixed in version 3.4.3.2-1. We recommend that you upgrade your phpymadmin packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJOLxE7AAoJEOxfUAG2iX57N88H/AnM44upqiG3cvo+OYiQq/75 K6dmp4s5hUwJNWYgb3ZlqHw3Cbd/+UMvxztpTMXnDpxddn0PPZR3d55dWSZHYKTf YdKrAwT7rnkpk6Gc6AOqy96XlxbqiqsRO9VVZCWqfiOSQm6wurzl1eQG8CIeuFg4 POsQFPo0AOoSMW1C/Lq0y7eArKJT+sjGdI4pdj32e7xJmWXXaU0IjMFIa/kWDo+p 2tbl6lRw262hEEq7immMETxEVoOe173KpYXpMly01tEKQIYepVXmNtDf2w1LgYWd /LgI837i/5UvGOlxEXSRpTYqShQZ3SWINWdCAxuR8QRdBh3jO+NA6Sr1MNhCX/E= =MSqd -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/