it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Thijs Kinkhorst <thijs AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 3627-1] phpmyadmin security update
- Date: Sun, 24 Jul 2016 18:03:22 +0200 (CEST)
- List-archive: https://lists.debian.org/msgid-search/20160724160322.E7F535A189 AT kinkhorst.com
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-return-path: <thijs AT kinkhorst.com>
- Priority: urgent
- Resent-date: Sun, 24 Jul 2016 16:03:48 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <VIn1-_RZu0B.A.fdH.kbOlXB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3627-1 security AT debian.org
https://www.debian.org/security/ Thijs Kinkhorst
July 24, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : phpmyadmin
CVE ID : CVE-2016-1927 CVE-2016-2039 CVE-2016-2040 CVE-2016-2041
CVE-2016-2560 CVE-2016-2561 CVE-2016-5099 CVE-2016-5701
CVE-2016-5705 CVE-2016-5706 CVE-2016-5731 CVE-2016-5733
CVE-2016-5739
Several vulnerabilities have been fixed in phpMyAdmin, the web-based
MySQL administration interface.
CVE-2016-1927
The suggestPassword function relied on a non-secure random number
generator which makes it easier for remote attackers to guess
generated passwords via a brute-force approach.
CVE-2016-2039
CSRF token values were generated by a non-secure random number
genrator, which allows remote attackers to bypass intended access
restrictions by predicting a value.
CVE-2016-2040
Multiple cross-site scripting (XSS) vulnerabilities allow remote
authenticated users to inject arbitrary web script or HTML.
CVE-2016-2041
phpMyAdmin does not use a constant-time algorithm for comparing
CSRF tokens, which makes it easier for remote attackers to bypass
intended access restrictions by measuring time differences.
CVE-2016-2560
Multiple cross-site scripting (XSS) vulnerabilities allow remote
attackers to inject arbitrary web script or HTML.
CVE-2016-2561
Multiple cross-site scripting (XSS) vulnerabilities allow remote
attackers to inject arbitrary web script or HTML.
CVE-2016-5099
Multiple cross-site scripting (XSS) vulnerabilities allow remote
attackers to inject arbitrary web script or HTML.
CVE-2016-5701
For installations running on plain HTTP, phpMyAdmin allows remote
attackers to conduct BBCode injection attacks against HTTP sessions
via a crafted URI.
CVE-2016-5705
Multiple cross-site scripting (XSS) vulnerabilities allow remote
attackers to inject arbitrary web script or HTML.
CVE-2016-5706
phpMyAdmin allows remote attackers to cause a denial of service
(resource consumption) via a large array in the scripts parameter.
CVE-2016-5731
A cross-site scripting (XSS) vulnerability allows remote
attackers to inject arbitrary web script or HTML.
CVE-2016-5733
Multiple cross-site scripting (XSS) vulnerabilities allow remote
attackers to inject arbitrary web script or HTML.
CVE-2016-5739
A specially crafted Transformation could leak information which
a remote attacker could use to perform cross site request forgeries.
For the stable distribution (jessie), these problems have been fixed in
version 4:4.2.12-2+deb8u2.
For the unstable distribution (sid), these problems have been fixed in
version 4:4.6.3-1.
We recommend that you upgrade your phpmyadmin packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBCAAGBQJXlOV9AAoJEFb2GnlAHawEeSIIAJ0l/EAEpsY6FXj/kcVfPhUF
xFD28T/wbya+LfO2cNIgVkDI3ddAV89ZeiU2uwk7Umk1YwhRwOgUhrmR0u9N4SRd
Dh7Q7QitCBjzGoCTgZxcd4n2eaCSq65jjKdQ0ag2bdWUGlL6Wg1vKudzGdiVOES7
yUJrzstuglDgOHS+BmYwslY3UMcYpVmieqvxMGk1f0dVgGUu8pSjzQo78+oSWLdr
DxOENu8gUsDUsknMX+taYHE2sqJNB/jNA/tFLBt5UDyS9Snzeovc3KI+OYGsYPyv
l4ujtMgAmZkq8OOEuig99tuB4jdsZ+LxoehS59oH31zI/uUeen0w0jKURTfEMxo=
=XDB8
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 3627-1] phpmyadmin security update, Thijs Kinkhorst, 24.07.2016
Archiv bereitgestellt durch MHonArc 2.6.19.