full-disclosure-uk January 2009 archive
Main Archive Page > Month Archives  > full-disclosure-uk archives
full-disclosure-uk: [Full-disclosure] [ MDVSA-2009:026 ] phpMyAd

[Full-disclosure] [ MDVSA-2009:026 ] phpMyAdmin

From: <security_at_nospam>
Date: Fri Jan 23 2009 - 18:47:00 GMT
To: full-disclosure@lists.grok.org.uk

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Mandriva Linux Security Advisory MDVSA-2009:026  http://www.mandriva.com/security/
Package : phpMyAdmin Date : January 23, 2009 Affected: Corporate 4.0
_______________________________________________________________________

 Problem Description:

 Cross-site scripting (XSS) vulnerability in pmd_pdf.php allows  remote attackers to inject arbitrary web script or HTML by  using db script parameter when register_global php parameter is  enabled (CVE-2008-4775).  

 Cross-site request forgery (CSRF) vulnerability in tbl_structure.php  allows remote attackers perform SQL injection and execute arbitrary  code by using table script parameter (CVE-2008-5621).  

 Multiple cross-site request forgery (CSRF) vulnerabilities in allows  remote attackers perform SQL injection by using unknown vectors  related to table script parameter (CVE-2008-5622).  

 This update provide the fix for these security issues.


 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4775 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5621 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5622
_______________________________________________________________________

 Updated Packages:

 Corporate 4.0:
 7589375efc20c24aec34469a8fcc05e8 corporate/4.0/i586/phpMyAdmin-2.11.9.4-0.1.20060mlcs4.noarch.rpm  fb84268bcbb158d12dbf17dade4c6007 corporate/4.0/SRPMS/phpMyAdmin-2.11.9.4-0.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 7589375efc20c24aec34469a8fcc05e8 corporate/4.0/x86_64/phpMyAdmin-2.11.9.4-0.1.20060mlcs4.noarch.rpm  fb84268bcbb158d12dbf17dade4c6007 corporate/4.0/SRPMS/phpMyAdmin-2.11.9.4-0.1.20060mlcs4.src.rpm


 To upgrade automatically use MandrivaUpdate or urpmi. The verification  of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security. You can obtain the  GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com


 Type Bits/KeyID Date User ID
 pub 1024D/22458A98 2000-07-10 Mandriva Security Team   <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJeeYWmqjQ0CJFipgRAjKGAKC8xyS5hfkxIXCdLlwXDCzc8wSSWQCfYhZW flqnZevpx1QiCbzxUxLB2k4=
=5fPr
-----END PGP SIGNATURE----- --===============1313305362==
Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline



Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ --===============1313305362==--