User: Password:
|
|
Subscribe / Log in / New account

Debian alert DSA-2391-1 (phpmyadmin)

From:  Thijs Kinkhorst <thijs@debian.org>
To:  debian-security-announce@lists.debian.org
Subject:  [SECURITY] [DSA 2391-1] phpmyadmin security update
Date:  Sun, 22 Jan 2012 14:00:02 +0100 (CET)
Message-ID:  <20120122130002.1072F5A359@kinkhorst.com>
Archive-link:  Article, Thread

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2391-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst January 22, 2012 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : phpmyadmin Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2011-1940 CVE-2011-3181 CVE-2011-4107 Debian Bug : 656247 Several vulnerabilities have been discovered in phpMyAdmin, a tool to administer MySQL over the web. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-4107 The XML import plugin allowed a remote attacker to read arbitrary files via XML data containing external entity references. CVE-2011-1940, CVE-2011-3181 Cross site scripting was possible in the table tracking feature, allowing a remote attacker to inject arbitrary web script or HTML. The oldstable distribution (lenny) is not affected by these problems. For the stable distribution (squeeze), these problems have been fixed in version 4:3.3.7-7. For the testing distribution (wheezy) and unstable distribution (sid), these problems have been fixed in version 4:3.4.7.1-1. We recommend that you upgrade your phpmyadmin packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQEcBAEBAgAGBQJPHAgeAAoJEOxfUAG2iX577fkH+wZb9s0OHT2HgHbxxncizJsm qlmN3Cg1RFR7eVzkTo4rPnEN6eGfshCqqdWGJGFn9BnZ4+PD/Cdjwpt0CH4rkPyW L3khvsg7JMF763G3O3iaN/+PpahmczAAcjTlX4hD+PgHZenmmOjat701gvrx0uPC fbtO0u5TA5uI1p60JlE03a2eNQtxNvJH6CJTTehrBhX2XF0tKPKo57rNQ5z2YZcl 745bx0cB/3RmgplF+kxSBolxXmj85Y6222IGGPuHxBkoJELZ/AUy/ivPUjZoFYTG 76XhURkKGU7fLnzn217MBT6saqug4qtCqnYTGMn9m+u/wRhL3d28FA/NwvQNX5g= =tBTr -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: http://lists.debian.org/20120122130002.1072F5A359@kinkhor...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds