Lucene search

K
debianDebianDEBIAN:DLA-551-1:E3A98
HistoryJul 17, 2016 - 8:43 p.m.

[SECURITY] [DLA 551-1] phpmyadmin security update

2016-07-1720:43:12
lists.debian.org
13

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.9 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.9%

Package : phpmyadmin
Version : 4:3.4.11.1-2+deb7u5
CVE ID : CVE-2016-5731 CVE-2016-5733 CVE-2016-5739

Phpmyadmin, a web administration tool for MySQL, had several
Cross Site Scripting (XSS) vulnerabilities were reported.

CVE-2016-5731

With a specially crafted request, it is possible to trigger
an XSS attack through the example OpenID authentication script.

CVE-2016-5733

Several XSS vulnerabilities were found with the Transformation
feature.
Also a vulnerability was reported allowing a specifically-
configured MySQL server to execute an XSS attack.
This particular attack requires configuring the MySQL server
log_bin directive with the payload.

CVE-2016-5739

A vulnerability was reported where a specially crafted
Transformation could be used to leak information including
the authentication token. This could be used to direct a
CSRF attack against a user.

For Debian 7 "Wheezy", these problems have been fixed in version
4:3.4.11.1-2+deb7u5.

We recommend that you upgrade your phpmyadmin packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


--------------------- Ola Lundqvist ---------------------------
/ [email protected] Folkebogatan 26
| [email protected] 654 68 KARLSTAD |
| http://inguza.com/ +46 (0)70-332 1551 |
\ gpg/f.p.: 22F2 32C6 B1E0 F4BF 2B26 0A6A 5E90 DCFA 9426 876F /

OSVersionArchitecturePackageVersionFilename
Debian8allphpmyadmin< 4:4.2.12-2+deb8u2phpmyadmin_4:4.2.12-2+deb8u2_all.deb
Debian7allphpmyadmin< 4:3.4.11.1-2+deb7u5phpmyadmin_4:3.4.11.1-2+deb7u5_all.deb

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.9 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.9%