what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 2391-1

Debian Security Advisory 2391-1
Posted Jan 23, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2391-1 - Several vulnerabilities have been discovered in phpMyAdmin, a tool to administer MySQL over the web.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2011-1940, CVE-2011-3181, CVE-2011-4107
SHA-256 | 6b9978773cc9b5ff74c87471f4d39830b867da4e8a3cd93f6b20507e4c14391b

Debian Security Advisory 2391-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2391-1 security@debian.org
http://www.debian.org/security/ Thijs Kinkhorst
January 22, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : phpmyadmin
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-1940 CVE-2011-3181 CVE-2011-4107
Debian Bug : 656247

Several vulnerabilities have been discovered in phpMyAdmin, a tool
to administer MySQL over the web. The Common Vulnerabilities and
Exposures project identifies the following problems:

CVE-2011-4107

The XML import plugin allowed a remote attacker to read arbitrary
files via XML data containing external entity references.

CVE-2011-1940, CVE-2011-3181

Cross site scripting was possible in the table tracking feature,
allowing a remote attacker to inject arbitrary web script or HTML.


The oldstable distribution (lenny) is not affected by these problems.

For the stable distribution (squeeze), these problems have been fixed
in version 4:3.3.7-7.

For the testing distribution (wheezy) and unstable distribution (sid),
these problems have been fixed in version 4:3.4.7.1-1.

We recommend that you upgrade your phpmyadmin packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iQEcBAEBAgAGBQJPHAgeAAoJEOxfUAG2iX577fkH+wZb9s0OHT2HgHbxxncizJsm
qlmN3Cg1RFR7eVzkTo4rPnEN6eGfshCqqdWGJGFn9BnZ4+PD/Cdjwpt0CH4rkPyW
L3khvsg7JMF763G3O3iaN/+PpahmczAAcjTlX4hD+PgHZenmmOjat701gvrx0uPC
fbtO0u5TA5uI1p60JlE03a2eNQtxNvJH6CJTTehrBhX2XF0tKPKo57rNQ5z2YZcl
745bx0cB/3RmgplF+kxSBolxXmj85Y6222IGGPuHxBkoJELZ/AUy/ivPUjZoFYTG
76XhURkKGU7fLnzn217MBT6saqug4qtCqnYTGMn9m+u/wRhL3d28FA/NwvQNX5g=
=tBTr
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    0 Files
  • 7
    Mar 7th
    0 Files
  • 8
    Mar 8th
    0 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    0 Files
  • 14
    Mar 14th
    0 Files
  • 15
    Mar 15th
    0 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close