---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Debian update for phpmyadmin SECUNIA ADVISORY ID: SA31960 VERIFY ADVISORY: http://secunia.com/advisories/31960/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting, Spoofing, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/advisories/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/advisories/product/530/ DESCRIPTION: Debian has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious, local users to conduct cross-site scripting attacks, by malicious users to compromise a vulnerable system, and by malicious people to conduct spoofing and cross-site request forgery attacks. For more information: SA31115 SA31263 SA31884 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-8.dsc Size/MD5 checksum: 1011 37114453aaf82b81dce82755e64ec033 http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-8.diff.gz Size/MD5 checksum:54521 a5b37a0f2d161337cc2acd5653c42312 http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1.orig.tar.gz Size/MD5 checksum:3500563 f598509b308bf96aee836eb2338f523c Architecture independent packages: http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-8_all.deb Size/MD5 checksum:3607794 01749fe13d966bba1c6394ff2c185204 -- Debian GNU/Linux unstable alias sid -- Fixed in version 4:2.11.8.1-2. ORIGINAL ADVISORY: DSA-1641-1: http://lists.debian.org/debian-security-announce/2008/msg00230.html OTHER REFERENCES: SA31115: http://secunia.com/advisories/31115/ SA31263: http://secunia.com/advisories/31263/ SA31884: http://secunia.com/advisories/31884/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------