Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200805-02 ] phpMyAdmin: Information disclosure
Date: Mon, 05 May 2008 21:38:46
Message-Id: 481F7E11.7040605@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200805-02
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Low
11 Title: phpMyAdmin: Information disclosure
12 Date: May 05, 2008
13 Bugs: #219005
14 ID: 200805-02
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 A vulnerability in phpMyAdmin may lead to information disclosure.
22
23 Background
24 ==========
25
26 phpMyAdmin is a tool written in PHP intended to handle the
27 administration of MySQL databases from a web-browser.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 dev-db/phpmyadmin < 2.11.5.2 >= 2.11.5.2
36
37 Description
38 ===========
39
40 Cezary Tomczak reported that an undefined UploadDir variable exposes an
41 information disclosure vulnerability when running on shared hosts.
42
43 Impact
44 ======
45
46 A remote attacker with CREATE TABLE permissions can exploit this
47 vulnerability via a specially crafted HTTP POST request in order to
48 read arbitrary files.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All phpMyAdmin users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.11.5.2"
62
63 References
64 ==========
65
66 [ 1 ] CVE-2008-1924
67 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1924
68
69 Availability
70 ============
71
72 This GLSA and any updates to it are available for viewing at
73 the Gentoo Security Website:
74
75 http://security.gentoo.org/glsa/glsa-200805-02.xml
76
77 Concerns?
78 =========
79
80 Security is a primary focus of Gentoo Linux and ensuring the
81 confidentiality and security of our users machines is of utmost
82 importance to us. Any security concerns should be addressed to
83 security@g.o or alternatively, you may file a bug at
84 http://bugs.gentoo.org.
85
86 License
87 =======
88
89 Copyright 2008 Gentoo Foundation, Inc; referenced text
90 belongs to its owner(s).
91
92 The contents of this document are licensed under the
93 Creative Commons - Attribution / Share Alike license.
94
95 http://creativecommons.org/licenses/by-sa/2.5
96 -----BEGIN PGP SIGNATURE-----
97 Version: GnuPG v2.0.7 (GNU/Linux)
98 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
99
100 iD8DBQFIH34RuhJ+ozIKI5gRApEYAJ46Qu3dq7DQJHXTaEJ6NtMmsbKaJQCgi8q1
101 y4VVfogC3jGPz0o5Ncw6qjA=
102 =exLu
103 -----END PGP SIGNATURE-----
104 --
105 gentoo-announce@l.g.o mailing list