- ------------------------------------------------------------------------
Debian Security Advisory DSA-1723-1                  security@debian.org
http://www.debian.org/security/                          Thijs Kinkhorst
February 11, 2009                     http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : phpmyadmin
Vulnerability  : insufficient input sanitising
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2008-5621

Michael Brooks discovered that phpMyAdmin, a tool to administrate MySQL
over the web, performs insufficient input sanitising allowing a user
assisted remote attacker to execute code on the webserver.

For the stable distribution (etch), this problem has been fixed in version
2.9.1.1-10.

For the testing distribution (lenny) and unstable distribution (sid), this
problem has been fixed in version 2.11.8.1-5.

We recommend that you upgrade your phpmyadmin package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

      Size/MD5 checksum:     1021 9428b84187a0fc1c893e099987f746f6
      Size/MD5 checksum:  3500563 f598509b308bf96aee836eb2338f523c
      Size/MD5 checksum:    54951 8441cbf454016d4425dddaef569bbd21

Architecture independent packages:

      Size/MD5 checksum:  3603132 538d80062d8fc4c009e0e0e01ffbacd4


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/

Debian: DSA-1723-1: New phpmyadmin packages fix arbitrary code execution

February 11, 2009
Michael Brooks discovered that phpMyAdmin, a tool to administrate MySQL over the web, performs insufficient input sanitising allowing a user assisted remote attacker to execute cod...

Summary

For the stable distribution (etch), this problem has been fixed in version
2.9.1.1-10.

For the testing distribution (lenny) and unstable distribution (sid), this
problem has been fixed in version 2.11.8.1-5.

We recommend that you upgrade your phpmyadmin package.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch

Source archives:

Size/MD5 checksum: 1021 9428b84187a0fc1c893e099987f746f6
Size/MD5 checksum: 3500563 f598509b308bf96aee836eb2338f523c
Size/MD5 checksum: 54951 8441cbf454016d4425dddaef569bbd21

Architecture independent packages:

Size/MD5 checksum: 3603132 538d80062d8fc4c009e0e0e01ffbacd4


These files will probably be moved into the stable distribution on
its next update.

For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/

Severity
Michael Brooks discovered that phpMyAdmin, a tool to administrate MySQL
over the web, performs insufficient input sanitising allowing a user
assisted remote attacker to execute code on the webserver.

Related News