svn commit: r316477 - in head: databases/phpmyadmin security/vuxml
Matthew Seaman
matthew at FreeBSD.org
Wed Apr 24 20:23:17 UTC 2013
Author: matthew
Date: Wed Apr 24 20:23:16 2013
New Revision: 316477
URL: http://svnweb.freebsd.org/changeset/ports/316477
Log:
Security updae to 3.5.8.1
Four new serious security alerts were issued today by the phpMyAdmin
them: PMASA-2013-2 and PMASA-2013-3 are documented in this commit to
vuln.xml.
- Remote code execution via preg_replace().
- Locally Saved SQL Dump File Multiple File Extension Remote Code
Execution.
The other two: PMASA-2013-4 and PMASA-2013-5 only affect PMA 4.0.0
pre-releases earlier than 4.0.0-rc3, which are not available through
the ports.
Modified:
head/databases/phpmyadmin/Makefile
head/databases/phpmyadmin/distinfo
head/security/vuxml/vuln.xml
Modified: head/databases/phpmyadmin/Makefile
==============================================================================
--- head/databases/phpmyadmin/Makefile Wed Apr 24 19:42:33 2013 (r316476)
+++ head/databases/phpmyadmin/Makefile Wed Apr 24 20:23:16 2013 (r316477)
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= phpMyAdmin
-DISTVERSION= 3.5.8
+DISTVERSION= 3.5.8.1
CATEGORIES= databases www
MASTER_SITES= SF/${PORTNAME:L}/${PORTNAME}/${DISTVERSION}
DISTNAME= ${PORTNAME}-${DISTVERSION}-all-languages
Modified: head/databases/phpmyadmin/distinfo
==============================================================================
--- head/databases/phpmyadmin/distinfo Wed Apr 24 19:42:33 2013 (r316476)
+++ head/databases/phpmyadmin/distinfo Wed Apr 24 20:23:16 2013 (r316477)
@@ -1,2 +1,2 @@
-SHA256 (phpMyAdmin-3.5.8-all-languages.tar.xz) = 0766acb45d862ca802b5d3018f240bdd0a14749e21f40ebabe51bf25d6088409
-SIZE (phpMyAdmin-3.5.8-all-languages.tar.xz) = 3744780
+SHA256 (phpMyAdmin-3.5.8.1-all-languages.tar.xz) = c66737ff55369b1c9e4b116e68f3c517faf7c4bc17e289d008d74fde6c8260f6
+SIZE (phpMyAdmin-3.5.8.1-all-languages.tar.xz) = 3744808
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Wed Apr 24 19:42:33 2013 (r316476)
+++ head/security/vuxml/vuln.xml Wed Apr 24 20:23:16 2013 (r316477)
@@ -51,6 +51,59 @@ Note: Please add new entries to the beg
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="8c8fa44d-ad15-11e2-8cea-6805ca0b3d42">
+ <topic>phpMyAdmin -- Multiple security vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>phpMyAdmin</name>
+ <range><ge>3.5</ge><lt>3.5.8.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The phpMyAdmin development team reports:</p>
+ <blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2013-2.php">
+ <p>In some PHP versions, the preg_replace() function can be
+ tricked into executing arbitrary PHP code on the
+ server. This is done by passing a crafted argument as the
+ regular expression, containing a null byte. phpMyAdmin does
+ not correctly sanitize an argument passed to preg_replace()
+ when using the "Replace table prefix" feature, opening the
+ way to this vulnerability..</p>
+ <p>This vulnerability can be triggered only by someone who
+ logged in to phpMyAdmin, as the usual token protection
+ prevents non-logged-in users to access the required
+ form.</p>
+ </blockquote>
+ <blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php">
+ <p>phpMyAdmin can be configured to save an export file on
+ the web server, via its SaveDir directive. With this in
+ place, it's possible, either via a crafted filename template
+ or a crafted table name, to save a double extension file
+ like foobar.php.sql. In turn, an Apache webserver on which
+ there is no definition for the MIME type "sql" (the default)
+ will treat this saved file as a ".php" script, leading to
+ remote code execution.</p>
+ <p>This vulnerability can be triggered only by someone who
+ logged in to phpMyAdmin, as the usual token protection
+ prevents non-logged-in users to access the required
+ form. Moreover, the SaveDir directive is empty by default,
+ so a default configuration is not vulnerable. The
+ $cfg['SaveDir'] directive must be configured, and the server
+ must be running Apache with mod_mime to be exploitable.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-3238</cvename>
+ <cvename>CVE-2013-3239</cvename>
+ </references>
+ <dates>
+ <discovery>2013-04-24</discovery>
+ <entry>2013-04-24</entry>
+ </dates>
+ </vuln>
+
<vuln vid="aeb962f6-ab8d-11e2-b3f5-003067c2616f">
<topic>tinc -- Buffer overflow</topic>
<affects>
More information about the svn-ports-all
mailing list