ALT-BU-2018-3321-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-1010057
nfdump 1.6.16 and earlier is affected by: Buffer Overflow. The impact is: The impact could range from a denial of service to local code execution. The component is: nfx.c:546, nffile_inline.c:83, minilzo.c (redistributed). The attack vector is: nfdump must read and process a specially crafted file. The fixed version is: after commit 9f0fe9563366f62a71d34c92229da3432ec5cf0e.
- https://github.com/phaag/nfdump/issues/104
- https://lists.debian.org/debian-lts-announce/2020/09/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULSZMKA7P7REJMANVL7D6WMZ2L7IRSET/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTONOGJU5FSMFNRCT6OHXYUMDRKH4RPA/
- https://security.gentoo.org/glsa/202003-17
- https://github.com/phaag/nfdump/issues/104
- https://lists.debian.org/debian-lts-announce/2020/09/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULSZMKA7P7REJMANVL7D6WMZ2L7IRSET/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTONOGJU5FSMFNRCT6OHXYUMDRKH4RPA/
- https://security.gentoo.org/glsa/202003-17
Package phpMyAdmin updated to version 4.8.2-alt1 for branch sisyphus in task 208858.
Closed vulnerabilities
BDU:2018-01545
Уязвимость веб-приложения для администрирования cистем управления базами данных phpMyAdmin, связанная с недостатками процедуры аутентификации, позволяющая нарушителю просматривать и выполнять файлы на сервере
Modified: 2024-11-21
CVE-2018-12581
An issue was discovered in js/designer/move.js in phpMyAdmin before 4.8.2. A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted database name to trigger an XSS attack when that database is referenced from the Designer feature.
Modified: 2024-11-21
CVE-2018-12613
An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
- http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html
- http://www.securityfocus.com/bid/104532
- https://security.gentoo.org/glsa/201904-16
- https://www.exploit-db.com/exploits/44924/
- https://www.exploit-db.com/exploits/44928/
- https://www.exploit-db.com/exploits/45020/
- https://www.phpmyadmin.net/security/PMASA-2018-4/
- http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html
- http://www.securityfocus.com/bid/104532
- https://security.gentoo.org/glsa/201904-16
- https://www.exploit-db.com/exploits/44924/
- https://www.exploit-db.com/exploits/44928/
- https://www.exploit-db.com/exploits/45020/
- https://www.phpmyadmin.net/security/PMASA-2018-4/
Closed bugs
недостающие зависимости