ALT-BU-2014-2784-1
Branch c7 update bulletin.
Package rednotebook updated to version 1.8.0-alt0.M70P.1 for branch c7 in task 119881.
Closed bugs
Ошибка запуска при установке из p7
Package phpMyAdmin updated to version 4.1.14-alt1 for branch c7 in task 119880.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-1879
Cross-site scripting (XSS) vulnerability in import.php in phpMyAdmin before 4.1.7 allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename in an import action.
- openSUSE-SU-2014:0344
- openSUSE-SU-2014:0344
- 59832
- 59832
- http://www.phpmyadmin.net/home_page/security/PMASA-2014-1.php
- http://www.phpmyadmin.net/home_page/security/PMASA-2014-1.php
- 65717
- 65717
- https://github.com/phpmyadmin/phpmyadmin/commit/968d5d5f486820bfa30af046f063b9f23304e14a
- https://github.com/phpmyadmin/phpmyadmin/commit/968d5d5f486820bfa30af046f063b9f23304e14a
Modified: 2024-11-21
CVE-2015-2206
libraries/select_lang.lib.php in phpMyAdmin 4.0.x before 4.0.10.9, 4.2.x before 4.2.13.2, and 4.3.x before 4.3.11.1 includes invalid language values in unknown-language error responses that contain a CSRF token and may be sent with HTTP compression, which makes it easier for remote attackers to conduct a BREACH attack and determine this token via a series of crafted requests.
- FEDORA-2015-3287
- FEDORA-2015-3287
- FEDORA-2015-3329
- FEDORA-2015-3329
- FEDORA-2015-3336
- FEDORA-2015-3336
- openSUSE-SU-2015:1191
- openSUSE-SU-2015:1191
- DSA-3382
- DSA-3382
- MDVSA-2015:186
- MDVSA-2015:186
- http://www.phpmyadmin.net/home_page/security/PMASA-2015-1.php
- http://www.phpmyadmin.net/home_page/security/PMASA-2015-1.php
- 72949
- 72949
- 1031871
- 1031871
- https://github.com/phpmyadmin/phpmyadmin/commit/b2f1e895038a5700bf8e81fb9a5da36cbdea0eeb
- https://github.com/phpmyadmin/phpmyadmin/commit/b2f1e895038a5700bf8e81fb9a5da36cbdea0eeb
Modified: 2024-11-21
CVE-2015-3902
Multiple cross-site request forgery (CSRF) vulnerabilities in the setup process in phpMyAdmin 4.0.x before 4.0.10.10, 4.2.x before 4.2.13.3, 4.3.x before 4.3.13.1, and 4.4.x before 4.4.6.1 allow remote attackers to hijack the authentication of administrators for requests that modify the configuration file.
- openSUSE-SU-2015:1191
- openSUSE-SU-2015:1191
- DSA-3382
- DSA-3382
- http://www.phpmyadmin.net/home_page/security/PMASA-2015-2.php
- http://www.phpmyadmin.net/home_page/security/PMASA-2015-2.php
- 74657
- 74657
- 1032404
- 1032404
- https://github.com/phpmyadmin/phpmyadmin/commit/ee92eb9bab8e2d546756c1d4aec81ec7c8e44b83
- https://github.com/phpmyadmin/phpmyadmin/commit/ee92eb9bab8e2d546756c1d4aec81ec7c8e44b83
Modified: 2024-11-21
CVE-2015-3903
libraries/Config.class.php in phpMyAdmin 4.0.x before 4.0.10.10, 4.2.x before 4.2.13.3, 4.3.x before 4.3.13.1, and 4.4.x before 4.4.6.1 disables X.509 certificate verification for GitHub API calls over SSL, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
- http://cxsecurity.com/issue/WLB-2015050095
- http://cxsecurity.com/issue/WLB-2015050095
- openSUSE-SU-2015:1191
- openSUSE-SU-2015:1191
- http://packetstormsecurity.com/files/131954/phpMyAdmin-4.4.6-Man-In-The-Middle.html
- http://packetstormsecurity.com/files/131954/phpMyAdmin-4.4.6-Man-In-The-Middle.html
- DSA-3382
- DSA-3382
- http://www.phpmyadmin.net/home_page/security/PMASA-2015-3.php
- http://www.phpmyadmin.net/home_page/security/PMASA-2015-3.php
- 20150514 phpMyAdmin 4.4.6 Man-In-the-Middle API Github
- 20150514 phpMyAdmin 4.4.6 Man-In-the-Middle API Github
- 74660
- 74660
- 1032403
- 1032403
- https://github.com/phpmyadmin/phpmyadmin/commit/5ebc4daf131dd3bd646326267f3e765d0249bbb4
- https://github.com/phpmyadmin/phpmyadmin/commit/5ebc4daf131dd3bd646326267f3e765d0249bbb4
Modified: 2024-11-21
CVE-2015-8669
libraries/config/messages.inc.php in phpMyAdmin 4.0.x before 4.0.10.12, 4.4.x before 4.4.15.2, and 4.5.x before 4.5.3.1 allows remote attackers to obtain sensitive information via a crafted request, which reveals the full path in an error message.
- openSUSE-SU-2016:0067
- openSUSE-SU-2016:0067
- 1034806
- 1034806
- https://github.com/phpmyadmin/phpmyadmin/commit/c4d649325b25139d7c097e56e2e46cc7187fae45
- https://github.com/phpmyadmin/phpmyadmin/commit/c4d649325b25139d7c097e56e2e46cc7187fae45
- https://www.phpmyadmin.net/security/PMASA-2015-6/
- https://www.phpmyadmin.net/security/PMASA-2015-6/
Modified: 2024-11-21
CVE-2016-2560
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.15, 4.4.x before 4.4.15.5, and 4.5.x before 4.5.5.1 allow remote attackers to inject arbitrary web script or HTML via (1) a crafted Host HTTP header, related to libraries/Config.class.php; (2) crafted JSON data, related to file_echo.php; (3) a crafted SQL query, related to js/functions.js; (4) the initial parameter to libraries/server_privileges.lib.php in the user accounts page; or (5) the it parameter to libraries/controllers/TableSearchController.class.php in the zoom search page.
- FEDORA-2016-65da02b95c
- FEDORA-2016-65da02b95c
- FEDORA-2016-02ee5b4002
- FEDORA-2016-02ee5b4002
- openSUSE-SU-2016:0663
- openSUSE-SU-2016:0663
- openSUSE-SU-2016:0666
- openSUSE-SU-2016:0666
- DSA-3627
- DSA-3627
- https://github.com/phpmyadmin/phpmyadmin/commit/38fa1191049ac0c626a6684eea52068dfbbb5078
- https://github.com/phpmyadmin/phpmyadmin/commit/38fa1191049ac0c626a6684eea52068dfbbb5078
- https://github.com/phpmyadmin/phpmyadmin/commit/41c4e0214c286f28830cca54423b5db57e7c0ce4
- https://github.com/phpmyadmin/phpmyadmin/commit/41c4e0214c286f28830cca54423b5db57e7c0ce4
- https://github.com/phpmyadmin/phpmyadmin/commit/7877a9c0084bf8ae15cbd8d2729b126271f682cc
- https://github.com/phpmyadmin/phpmyadmin/commit/7877a9c0084bf8ae15cbd8d2729b126271f682cc
- https://github.com/phpmyadmin/phpmyadmin/commit/ab1283e8366c97a155d4e9ae58628a248458ea32
- https://github.com/phpmyadmin/phpmyadmin/commit/ab1283e8366c97a155d4e9ae58628a248458ea32
- https://github.com/phpmyadmin/phpmyadmin/commit/c842a0de9288033d25404d1d6eb22dd83033675f
- https://github.com/phpmyadmin/phpmyadmin/commit/c842a0de9288033d25404d1d6eb22dd83033675f
- https://www.phpmyadmin.net/security/PMASA-2016-11/
- https://www.phpmyadmin.net/security/PMASA-2016-11/
Modified: 2024-11-21
CVE-2016-4412
An issue was discovered in phpMyAdmin. A user can be tricked into following a link leading to phpMyAdmin, which after authentication redirects to another malicious site. The attacker must sniff the user's valid phpMyAdmin token. All 4.0.x versions (prior to 4.0.10.16) are affected.
Modified: 2024-11-21
CVE-2016-5701
setup/frames/index.inc.php in phpMyAdmin 4.0.10.x before 4.0.10.16, 4.4.15.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to conduct BBCode injection attacks against HTTP sessions via a crafted URI.
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1700
- openSUSE-SU-2016:1700
- DSA-3627
- DSA-3627
- 91383
- 91383
- https://github.com/phpmyadmin/phpmyadmin/commit/1dca386505f396f0c2035112a403cc80768a141f
- https://github.com/phpmyadmin/phpmyadmin/commit/1dca386505f396f0c2035112a403cc80768a141f
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-17/
- https://www.phpmyadmin.net/security/PMASA-2016-17/
Modified: 2024-11-21
CVE-2016-5706
js/get_scripts.js.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to cause a denial of service via a large array in the scripts parameter.
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1700
- openSUSE-SU-2016:1700
- DSA-3627
- DSA-3627
- 91376
- 91376
- https://github.com/phpmyadmin/phpmyadmin/commit/4767f24ea4c1e3822ce71a636c341e8ad8d07aa6
- https://github.com/phpmyadmin/phpmyadmin/commit/4767f24ea4c1e3822ce71a636c341e8ad8d07aa6
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-22/
- https://www.phpmyadmin.net/security/PMASA-2016-22/
Modified: 2024-11-21
CVE-2016-5730
phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to obtain sensitive information via vectors involving (1) an array value to FormDisplay.php, (2) incorrect data to validate.php, (3) unexpected data to Validator.php, (4) a missing config directory during setup, or (5) an incorrect OpenID identifier data type, which reveals the full path in an error message.
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1700
- openSUSE-SU-2016:1700
- 91379
- 91379
- https://github.com/phpmyadmin/phpmyadmin/commit/27664605b945b13e1d2b71adea822ace2099cc96
- https://github.com/phpmyadmin/phpmyadmin/commit/27664605b945b13e1d2b71adea822ace2099cc96
- https://github.com/phpmyadmin/phpmyadmin/commit/331c560fbfa0e7d2dce674b5e88e983c5f2a451d
- https://github.com/phpmyadmin/phpmyadmin/commit/331c560fbfa0e7d2dce674b5e88e983c5f2a451d
- https://github.com/phpmyadmin/phpmyadmin/commit/96e0aa35653ec0c66084a7e9343465e16c1f769b
- https://github.com/phpmyadmin/phpmyadmin/commit/96e0aa35653ec0c66084a7e9343465e16c1f769b
- https://github.com/phpmyadmin/phpmyadmin/commit/b0180f18c828706af3a6800f0fb01a536d3ef8c7
- https://github.com/phpmyadmin/phpmyadmin/commit/b0180f18c828706af3a6800f0fb01a536d3ef8c7
- https://github.com/phpmyadmin/phpmyadmin/commit/cd229d718e8cb4bc8ba32446beaa82d27727b6f0
- https://github.com/phpmyadmin/phpmyadmin/commit/cd229d718e8cb4bc8ba32446beaa82d27727b6f0
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-23/
- https://www.phpmyadmin.net/security/PMASA-2016-23/
Modified: 2024-11-21
CVE-2016-5731
Cross-site scripting (XSS) vulnerability in examples/openid.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via vectors involving an OpenID error message.
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1700
- openSUSE-SU-2016:1700
- DSA-3627
- DSA-3627
- https://github.com/phpmyadmin/phpmyadmin/commit/418aeea3d83b0b6021bac311d849570acfc6e48c
- https://github.com/phpmyadmin/phpmyadmin/commit/418aeea3d83b0b6021bac311d849570acfc6e48c
- https://github.com/phpmyadmin/phpmyadmin/commit/94cf3864254ffaf3a69e97d8fc454888368b94ab
- https://github.com/phpmyadmin/phpmyadmin/commit/94cf3864254ffaf3a69e97d8fc454888368b94ab
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-24/
- https://www.phpmyadmin.net/security/PMASA-2016-24/
Modified: 2024-11-21
CVE-2016-5733
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) a crafted table name that is mishandled during privilege checking in table_row.phtml, (2) a crafted mysqld log_bin directive that is mishandled in log_selector.phtml, (3) the Transformation implementation, (4) AJAX error handling in js/ajax.js, (5) the Designer implementation, (6) the charts implementation in js/tbl_chart.js, or (7) the zoom-search implementation in rows_zoom.phtml.
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1700
- openSUSE-SU-2016:1700
- DSA-3627
- DSA-3627
- 91390
- 91390
- https://github.com/phpmyadmin/phpmyadmin/commit/4d21b5c077db50c2a54b7f569d20f463cc2651f5
- https://github.com/phpmyadmin/phpmyadmin/commit/4d21b5c077db50c2a54b7f569d20f463cc2651f5
- https://github.com/phpmyadmin/phpmyadmin/commit/615212a14d7d87712202f37354acf8581987fc5a
- https://github.com/phpmyadmin/phpmyadmin/commit/615212a14d7d87712202f37354acf8581987fc5a
- https://github.com/phpmyadmin/phpmyadmin/commit/79661610f6f65443e0ec1e382a7240437f28436c
- https://github.com/phpmyadmin/phpmyadmin/commit/79661610f6f65443e0ec1e382a7240437f28436c
- https://github.com/phpmyadmin/phpmyadmin/commit/8716855b309dbe65d7b9a5d681b80579b225b322
- https://github.com/phpmyadmin/phpmyadmin/commit/8716855b309dbe65d7b9a5d681b80579b225b322
- https://github.com/phpmyadmin/phpmyadmin/commit/895a131d2eb7e447757a35d5731c7d647823ea8b
- https://github.com/phpmyadmin/phpmyadmin/commit/895a131d2eb7e447757a35d5731c7d647823ea8b
- https://github.com/phpmyadmin/phpmyadmin/commit/960fd1fd52023047a23d069178bfff7463c2cefc
- https://github.com/phpmyadmin/phpmyadmin/commit/960fd1fd52023047a23d069178bfff7463c2cefc
- https://github.com/phpmyadmin/phpmyadmin/commit/be3ecbb4cca3fbe20e3b3aa4e049902d18b60865
- https://github.com/phpmyadmin/phpmyadmin/commit/be3ecbb4cca3fbe20e3b3aa4e049902d18b60865
- https://github.com/phpmyadmin/phpmyadmin/commit/d648ade18d6cbb796a93261491c121f078df2d88
- https://github.com/phpmyadmin/phpmyadmin/commit/d648ade18d6cbb796a93261491c121f078df2d88
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-26/
- https://www.phpmyadmin.net/security/PMASA-2016-26/
Modified: 2024-11-21
CVE-2016-5734
phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.
- 91387
- 91387
- https://github.com/phpmyadmin/phpmyadmin/commit/1cc7466db3a05e95fe57a6702f41773e6829d54b
- https://github.com/phpmyadmin/phpmyadmin/commit/1cc7466db3a05e95fe57a6702f41773e6829d54b
- https://github.com/phpmyadmin/phpmyadmin/commit/4bcc606225f15bac0b07780e74f667f6ac283da7
- https://github.com/phpmyadmin/phpmyadmin/commit/4bcc606225f15bac0b07780e74f667f6ac283da7
- GLSA-201701-32
- GLSA-201701-32
- 40185
- 40185
- https://www.phpmyadmin.net/security/PMASA-2016-27/
- https://www.phpmyadmin.net/security/PMASA-2016-27/
Modified: 2024-11-21
CVE-2016-5739
The Transformation implementation in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not use the no-referrer Content Security Policy (CSP) protection mechanism, which makes it easier for remote attackers to conduct CSRF attacks by reading an authentication token in a Referer header, related to libraries/Header.php.
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1700
- openSUSE-SU-2016:1700
- DSA-3627
- DSA-3627
- 91389
- 91389
- https://github.com/phpmyadmin/phpmyadmin/commit/1e5716cb96d46efc305381ae0da08e73fe340f05
- https://github.com/phpmyadmin/phpmyadmin/commit/1e5716cb96d46efc305381ae0da08e73fe340f05
- https://github.com/phpmyadmin/phpmyadmin/commit/2f4950828ec241e8cbdcf13090c2582a6fa620cb
- https://github.com/phpmyadmin/phpmyadmin/commit/2f4950828ec241e8cbdcf13090c2582a6fa620cb
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-28/
- https://www.phpmyadmin.net/security/PMASA-2016-28/
Modified: 2024-11-21
CVE-2016-6606
An issue was discovered in cookie encryption in phpMyAdmin. The decryption of the username/password is vulnerable to a padding oracle attack. This can allow an attacker who has access to a user's browser cookie file to decrypt the username and password. Furthermore, the same initialization vector (IV) is used to hash the username and password stored in the phpMyAdmin cookie. If a user has the same password as their username, an attacker who examines the browser cookie can see that they are the same - but the attacker can not directly decode these values from the cookie as it is still hashed. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 94114
- 94114
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-29
- https://www.phpmyadmin.net/security/PMASA-2016-29
Modified: 2024-11-21
CVE-2016-6607
XSS issues were discovered in phpMyAdmin. This affects Zoom search (specially crafted column content can be used to trigger an XSS attack); GIS editor (certain fields in the graphical GIS editor are not properly escaped and can be used to trigger an XSS attack); Relation view; the following Transformations: Formatted, Imagelink, JPEG: Upload, RegexValidation, JPEG inline, PNG inline, and transformation wrapper; XML export; MediaWiki export; Designer; When the MySQL server is running with a specially-crafted log_bin directive; Database tab; Replication feature; and Database search. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 93257
- 93257
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-30
- https://www.phpmyadmin.net/security/PMASA-2016-30
Modified: 2024-11-21
CVE-2016-6609
An issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 94112
- 94112
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-32
- https://www.phpmyadmin.net/security/PMASA-2016-32
Modified: 2024-11-21
CVE-2016-6610
A full path disclosure vulnerability was discovered in phpMyAdmin where a user can trigger a particular error in the export mechanism to discover the full path of phpMyAdmin on the disk. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Modified: 2024-11-21
CVE-2016-6611
An issue was discovered in phpMyAdmin. A specially crafted database and/or table name can be used to trigger an SQL injection attack through the export functionality. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 94117
- 94117
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-34
- https://www.phpmyadmin.net/security/PMASA-2016-34
Modified: 2024-11-21
CVE-2016-6612
An issue was discovered in phpMyAdmin. A user can exploit the LOAD LOCAL INFILE functionality to expose files on the server to the database system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 94113
- 94113
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-35
- https://www.phpmyadmin.net/security/PMASA-2016-35
Modified: 2024-11-21
CVE-2016-6613
An issue was discovered in phpMyAdmin. A user can specially craft a symlink on disk, to a file which phpMyAdmin is permitted to read but the user is not, which phpMyAdmin will then expose to the user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 94115
- 94115
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-36
- https://www.phpmyadmin.net/security/PMASA-2016-36
Modified: 2024-11-21
CVE-2016-6614
An issue was discovered in phpMyAdmin involving the %u username replacement functionality of the SaveDir and UploadDir features. When the username substitution is configured, a specially-crafted user name can be used to circumvent restrictions to traverse the file system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 94366
- 94366
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-37
- https://www.phpmyadmin.net/security/PMASA-2016-37
Modified: 2024-11-21
CVE-2016-6618
An issue was discovered in phpMyAdmin. The transformation feature allows a user to trigger a denial-of-service (DoS) attack against the server. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 95047
- 95047
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-41
- https://www.phpmyadmin.net/security/PMASA-2016-41
Modified: 2024-11-21
CVE-2016-6619
An issue was discovered in phpMyAdmin. In the user interface preference feature, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 95048
- 95048
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-42
- https://www.phpmyadmin.net/security/PMASA-2016-42
Modified: 2024-11-21
CVE-2016-6620
An issue was discovered in phpMyAdmin. Some data is passed to the PHP unserialize() function without verification that it's valid serialized data. The unserialization can result in code execution because of the interaction with object instantiation and autoloading. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 95055
- 95055
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-43
- https://www.phpmyadmin.net/security/PMASA-2016-43
Modified: 2024-11-21
CVE-2016-6621
The setup script for phpMyAdmin before 4.0.10.19, 4.4.x before 4.4.15.10, and 4.6.x before 4.6.6 allows remote attackers to conduct server-side request forgery (SSRF) attacks via unspecified vectors.
Modified: 2024-11-21
CVE-2016-6622
An issue was discovered in phpMyAdmin. An unauthenticated user is able to execute a denial-of-service (DoS) attack by forcing persistent connections when phpMyAdmin is running with $cfg['AllowArbitraryServer']=true. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 95049
- 95049
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-45
- https://www.phpmyadmin.net/security/PMASA-2016-45
Modified: 2024-11-21
CVE-2016-6623
An issue was discovered in phpMyAdmin. An authorized user can cause a denial-of-service (DoS) attack on a server by passing large values to a loop. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Modified: 2024-11-21
CVE-2016-6624
An issue was discovered in phpMyAdmin involving improper enforcement of the IP-based authentication rules. When phpMyAdmin is used with IPv6 in a proxy server environment, and the proxy server is in the allowed range but the attacking computer is not allowed, this vulnerability can allow the attacking computer to connect despite the IP rules. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92489
- 92489
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-47
- https://www.phpmyadmin.net/security/PMASA-2016-47
Modified: 2024-11-21
CVE-2016-6625
An issue was discovered in phpMyAdmin. An attacker can determine whether a user is logged in to phpMyAdmin. The user's session, username, and password are not compromised by this vulnerability. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Modified: 2024-11-21
CVE-2016-6626
An issue was discovered in phpMyAdmin. An attacker could redirect a user to a malicious web page. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92490
- 92490
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-49
- https://www.phpmyadmin.net/security/PMASA-2016-49
Modified: 2024-11-21
CVE-2016-6627
An issue was discovered in phpMyAdmin. An attacker can determine the phpMyAdmin host location through the file url.php. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92494
- 92494
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-50
- https://www.phpmyadmin.net/security/PMASA-2016-50
Modified: 2024-11-21
CVE-2016-6628
An issue was discovered in phpMyAdmin. An attacker may be able to trigger a user to download a specially crafted malicious SVG file. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92492
- 92492
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-51
- https://www.phpmyadmin.net/security/PMASA-2016-51
Modified: 2024-11-21
CVE-2016-6629
An issue was discovered in phpMyAdmin involving the $cfg['ArbitraryServerRegexp'] configuration directive. An attacker could reuse certain cookie values in a way of bypassing the servers defined by ArbitraryServerRegexp. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Modified: 2024-11-21
CVE-2016-6630
An issue was discovered in phpMyAdmin. An authenticated user can trigger a denial-of-service (DoS) attack by entering a very long password at the change password dialog. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92501
- 92501
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-53
- https://www.phpmyadmin.net/security/PMASA-2016-53
Modified: 2024-11-21
CVE-2016-6631
An issue was discovered in phpMyAdmin. A user can execute a remote code execution attack against a server when phpMyAdmin is being run as a CGI application. Under certain server configurations, a user can pass a query string which is executed as a command-line argument by the file generator_plugin.sh. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92496
- 92496
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-54
- https://www.phpmyadmin.net/security/PMASA-2016-54
Modified: 2024-11-21
CVE-2016-6632
An issue was discovered in phpMyAdmin where, under certain conditions, phpMyAdmin may not delete temporary files during the import of ESRI files. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92497
- 92497
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-55
- https://www.phpmyadmin.net/security/PMASA-2016-55
Modified: 2024-11-21
CVE-2016-6633
An issue was discovered in phpMyAdmin. phpMyAdmin can be used to trigger a remote code execution attack against certain PHP installations that are running with the dbase extension. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Modified: 2024-11-21
CVE-2016-9847
An issue was discovered in phpMyAdmin. When the user does not specify a blowfish_secret key for encrypting cookies, phpMyAdmin generates one at runtime. A vulnerability was reported where the way this value is created uses a weak algorithm. This could allow an attacker to determine the user's blowfish_secret and potentially decrypt their cookies. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9848
An issue was discovered in phpMyAdmin. phpinfo (phpinfo.php) shows PHP information including values of HttpOnly cookies. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9849
An issue was discovered in phpMyAdmin. It is possible to bypass AllowRoot restriction ($cfg['Servers'][$i]['AllowRoot']) and deny rules for username by using Null Byte in the username. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
- 94521
- 94521
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-60
- https://www.phpmyadmin.net/security/PMASA-2016-60
Modified: 2024-11-21
CVE-2016-9850
An issue was discovered in phpMyAdmin. Username matching for the allow/deny rules may result in wrong matches and detection of the username in the rule due to non-constant execution time. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
- 94529
- 94529
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-61
- https://www.phpmyadmin.net/security/PMASA-2016-61
Modified: 2024-11-21
CVE-2016-9856
An XSS issue was discovered in phpMyAdmin because of an improper fix for CVE-2016-2559 in PMASA-2016-10. This issue is resolved by using a copy of a hash to avoid a race condition. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9857
An issue was discovered in phpMyAdmin. XSS is possible because of a weakness in a regular expression used in some JavaScript processing. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9858
An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to initiate a denial of service attack in saved searches feature. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9859
An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to initiate a denial of service attack in import feature. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9860
An issue was discovered in phpMyAdmin. An unauthenticated user can execute a denial of service attack when phpMyAdmin is running with $cfg['AllowArbitraryServer']=true. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9861
An issue was discovered in phpMyAdmin. Due to the limitation in URL matching, it was possible to bypass the URL white-list protection. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
- 94535
- 94535
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-66
- https://www.phpmyadmin.net/security/PMASA-2016-66
Modified: 2024-11-21
CVE-2016-9864
An issue was discovered in phpMyAdmin. With a crafted username or a table name, it was possible to inject SQL statements in the tracking functionality that would run with the privileges of the control user. This gives read and write access to the tables of the configuration storage database, and if the control user has the necessary privileges, read access to some tables of the MySQL database. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
- 94533
- 94533
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-69
- https://www.phpmyadmin.net/security/PMASA-2016-69
Modified: 2024-11-21
CVE-2016-9865
An issue was discovered in phpMyAdmin. Due to a bug in serialized string parsing, it was possible to bypass the protection offered by PMA_safeUnserialize() function. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
- 94531
- 94531
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-70
- https://www.phpmyadmin.net/security/PMASA-2016-70
Modified: 2024-11-21
CVE-2016-9866
An issue was discovered in phpMyAdmin. When the arg_separator is different from its default & value, the CSRF token was not properly stripped from the return URL of the preference import action. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2017-1000013
phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to an open redirect weakness
Modified: 2024-11-21
CVE-2017-1000014
phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a DOS weakness in the table editing functionality
Modified: 2024-11-21
CVE-2017-1000015
phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a CSS injection attack through crafted cookie parameters
Modified: 2024-11-21
CVE-2017-1000017
phpMyAdmin 4.0, 4.4 and 4.6 are vulnerable to a weakness where a user with appropriate permissions is able to connect to an arbitrary MySQL server
Modified: 2024-11-21
CVE-2017-1000018
phpMyAdmin 4.0, 4.4., and 4.6 are vulnerable to a DOS attack in the replication status by using a specially crafted table name
Modified: 2024-11-21
CVE-2017-18264
An issue was discovered in libraries/common.inc.php in phpMyAdmin 4.0 before 4.0.10.20, 4.4.x, 4.6.x, and 4.7.0 prereleases. The restrictions caused by $cfg['Servers'][$i]['AllowNoPassword'] = false are bypassed under certain PHP versions (e.g., version 5). This can allow the login of users who have no password set even if the administrator has set $cfg['Servers'][$i]['AllowNoPassword'] to false (which is also the default). This occurs because some implementations of the PHP substr function return false when given '' as the first argument.
Closed bugs
Неверный путь к файлам
Closed bugs
Обновить версию
Closed vulnerabilities
BDU:2015-09759
Уязвимость операционной системы Gentoo Linux, позволяющая злоумышленнику нарушить конфиденциальность защищаемой информации
Modified: 2024-11-21
CVE-2014-0017
The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
- openSUSE-SU-2014:0366
- openSUSE-SU-2014:0366
- openSUSE-SU-2014:0370
- openSUSE-SU-2014:0370
- 57407
- 57407
- DSA-2879
- DSA-2879
- http://www.libssh.org/2014/03/04/libssh-0-6-3-security-release/
- http://www.libssh.org/2014/03/04/libssh-0-6-3-security-release/
- [oss-security] 20140305 libssh and stunnel PRNG flaws
- [oss-security] 20140305 libssh and stunnel PRNG flaws
- USN-2145-1
- USN-2145-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1072191
- https://bugzilla.redhat.com/show_bug.cgi?id=1072191
Closed vulnerabilities
BDU:2015-06368
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06369
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06370
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06371
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06372
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06373
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06374
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09705
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09764
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2013-6462
Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
- http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63
- http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63
- openSUSE-SU-2014:0073
- openSUSE-SU-2014:0073
- openSUSE-SU-2014:0075
- openSUSE-SU-2014:0075
- [xorg-announce] 20140107 X.Org Security Advisory: CVE-2013-6462: Stack buffer overflow in parsing of BDF font files in libXfont
- [xorg-announce] 20140107 X.Org Security Advisory: CVE-2013-6462: Stack buffer overflow in parsing of BDF font files in libXfont
- 101842
- 101842
- RHSA-2014:0018
- RHSA-2014:0018
- [oss-security] 20140107 Fwd: X.Org Security Advisory: CVE-2013-6462: Stack buffer overflow in parsing of BDF font files in libXfont
- [oss-security] 20140107 Fwd: X.Org Security Advisory: CVE-2013-6462: Stack buffer overflow in parsing of BDF font files in libXfont
- 56240
- 56240
- 56336
- 56336
- 56357
- 56357
- 56371
- 56371
- DSA-2838
- DSA-2838
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- 64694
- 64694
- USN-2078-1
- USN-2078-1
- libxfont-cve20136462-bo(90123)
- libxfont-cve20136462-bo(90123)
Modified: 2024-11-21
CVE-2014-0209
Multiple integer overflows in the (1) FontFileAddEntry and (2) lexAlias functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.
- http://advisories.mageia.org/MGASA-2014-0278.html
- http://advisories.mageia.org/MGASA-2014-0278.html
- openSUSE-SU-2014:0711
- openSUSE-SU-2014:0711
- [xorg-announce] 20140513 [ANNOUNCE] X.Org Security Advisory: Multiple issues in libXfont
- [xorg-announce] 20140513 [ANNOUNCE] X.Org Security Advisory: Multiple issues in libXfont
- RHSA-2014:1893
- RHSA-2014:1893
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 59154
- 59154
- DSA-2927
- DSA-2927
- MDVSA-2015:145
- MDVSA-2015:145
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 67382
- 67382
- USN-2211-1
- USN-2211-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Modified: 2024-11-21
CVE-2014-0210
Multiple buffer overflows in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs protocol reply to the (1) _fs_recv_conn_setup, (2) fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info, (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info function.
- http://advisories.mageia.org/MGASA-2014-0278.html
- http://advisories.mageia.org/MGASA-2014-0278.html
- openSUSE-SU-2014:0711
- openSUSE-SU-2014:0711
- [xorg-announce] 20140513 [ANNOUNCE] X.Org Security Advisory: Multiple issues in libXfont
- [xorg-announce] 20140513 [ANNOUNCE] X.Org Security Advisory: Multiple issues in libXfont
- RHSA-2014:1893
- RHSA-2014:1893
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 59154
- 59154
- DSA-2927
- DSA-2927
- MDVSA-2015:145
- MDVSA-2015:145
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 67382
- 67382
- USN-2211-1
- USN-2211-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Modified: 2024-11-21
CVE-2014-0211
Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
- http://advisories.mageia.org/MGASA-2014-0278.html
- http://advisories.mageia.org/MGASA-2014-0278.html
- openSUSE-SU-2014:0711
- openSUSE-SU-2014:0711
- [xorg-announce] 20140513 [ANNOUNCE] X.Org Security Advisory: Multiple issues in libXfont
- [xorg-announce] 20140513 [ANNOUNCE] X.Org Security Advisory: Multiple issues in libXfont
- RHSA-2014:1893
- RHSA-2014:1893
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 59154
- 59154
- DSA-2927
- DSA-2927
- MDVSA-2015:145
- MDVSA-2015:145
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 67382
- 67382
- USN-2211-1
- USN-2211-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Closed vulnerabilities
BDU:2015-05887
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05888
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05889
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05890
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05891
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05892
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05893
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05894
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05895
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05896
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05897
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05898
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05899
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2017-08-29
CVE-2012-5533
The http_request_split_value function in request.c in lighttpd before 1.4.32 allows remote attackers to cause a denial of service (infinite loop) via a request with a header containing an empty token, as demonstrated using the "Connection: TE,,Keep-Alive" header.
- 87623
- 22902
- 56619
- http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.31_fix_connection_header_dos.patch
- 51298
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt
- openSUSE-SU-2012:1532
- [oss-security] 20121121 lighttpd 1.4.32 released, fixing CVE-2012-5533
- 1027802
- 51268
- http://packetstormsecurity.org/files/118282/Simple-Lighttpd-1.4.31-Denial-Of-Service.html
- openSUSE-SU-2014:0074
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0345
- MDVSA-2013:100
- HPSBGN03191
- lighttpd-httprequestsplitvalue-dos(80213)
Modified: 2024-11-21
CVE-2013-4508
lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt
- JVN#37417423
- JVN#37417423
- openSUSE-SU-2014:0072
- openSUSE-SU-2014:0072
- HPSBGN03191
- HPSBGN03191
- [oss-security] 20131104 Re: CVE Request: lighttpd using vulnerable cipher suites with SNI
- [oss-security] 20131104 Re: CVE Request: lighttpd using vulnerable cipher suites with SNI
- http://redmine.lighttpd.net/issues/2525
- http://redmine.lighttpd.net/issues/2525
- http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2913/diff/
- http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2913/diff/
- DSA-2795
- DSA-2795
Modified: 2024-11-21
CVE-2013-4559
lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached.
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_02.txt
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_02.txt
- JVN#37417423
- JVN#37417423
- openSUSE-SU-2014:0072
- openSUSE-SU-2014:0072
- HPSBGN03191
- HPSBGN03191
- 55682
- 55682
- [oss-security] 20131112 Re: CVE Request: lighttpd multiple issues (setuid/... unchecked return value, FAM: read after free)
- [oss-security] 20131112 Re: CVE Request: lighttpd multiple issues (setuid/... unchecked return value, FAM: read after free)
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310
- DSA-2795
- DSA-2795
Modified: 2024-11-21
CVE-2013-4560
Use-after-free vulnerability in lighttpd before 1.4.33 allows remote attackers to cause a denial of service (segmentation fault and crash) via unspecified vectors that trigger FAMMonitorDirectory failures.
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_03.txt
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_03.txt
- JVN#37417423
- JVN#37417423
- openSUSE-SU-2014:0072
- openSUSE-SU-2014:0072
- HPSBGN03191
- HPSBGN03191
- 55682
- 55682
- [oss-security] 20131112 Re: CVE Request: lighttpd multiple issues (setuid/... unchecked return value, FAM: read after free)
- [oss-security] 20131112 Re: CVE Request: lighttpd multiple issues (setuid/... unchecked return value, FAM: read after free)
- DSA-2795
- DSA-2795
Modified: 2024-11-21
CVE-2014-2323
SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname.
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
- JVN#37417423
- JVN#37417423
- openSUSE-SU-2014:0449
- openSUSE-SU-2014:0449
- SUSE-SU-2014:0474
- SUSE-SU-2014:0474
- openSUSE-SU-2014:0496
- openSUSE-SU-2014:0496
- HPSBGN03191
- HPSBGN03191
- [oss-security] 20140312 lighttpd 1.4.34 SQL injection and path traversal CVE request
- [oss-security] 20140312 lighttpd 1.4.34 SQL injection and path traversal CVE request
- [oss-security] 20140312 Re: lighttpd 1.4.34 SQL injection and path traversal CVE request
- [oss-security] 20140312 Re: lighttpd 1.4.34 SQL injection and path traversal CVE request
- 57404
- 57404
- 57514
- 57514
- DSA-2877
- DSA-2877
- http://www.lighttpd.net/2014/3/12/1.4.35/
- http://www.lighttpd.net/2014/3/12/1.4.35/
Modified: 2024-11-21
CVE-2014-2324
Multiple directory traversal vulnerabilities in (1) mod_evhost and (2) mod_simple_vhost in lighttpd before 1.4.35 allow remote attackers to read arbitrary files via a .. (dot dot) in the host name, related to request_check_hostname.
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
- JVN#37417423
- JVN#37417423
- openSUSE-SU-2014:0449
- openSUSE-SU-2014:0449
- SUSE-SU-2014:0474
- SUSE-SU-2014:0474
- openSUSE-SU-2014:0496
- openSUSE-SU-2014:0496
- HPSBGN03191
- HPSBGN03191
- [oss-security] 20140312 lighttpd 1.4.34 SQL injection and path traversal CVE request
- [oss-security] 20140312 lighttpd 1.4.34 SQL injection and path traversal CVE request
- [oss-security] 20140312 Re: lighttpd 1.4.34 SQL injection and path traversal CVE request
- [oss-security] 20140312 Re: lighttpd 1.4.34 SQL injection and path traversal CVE request
- 57404
- 57404
- 57514
- 57514
- DSA-2877
- DSA-2877
- http://www.lighttpd.net/2014/3/12/1.4.35/
- http://www.lighttpd.net/2014/3/12/1.4.35/
- 66157
- 66157