Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.703627 |
Category: | Debian Local Security Checks |
Title: | Debian Security Advisory DSA 3627-1 (phpmyadmin - security update) |
Summary: | Several vulnerabilities have been fixed in;phpMyAdmin, the web-based MySQL administration interface.;;CVE-2016-1927;The suggestPassword function relied on a non-secure random number;generator which makes it easier for remote attackers to guess;generated passwords via a brute-force approach.;;CVE-2016-2039;CSRF token values were generated by a non-secure random number;generator, which allows remote attackers to bypass intended access;restrictions by predicting a value.;;CVE-2016-2040;Multiple cross-site scripting (XSS) vulnerabilities allow remote;authenticated users to inject arbitrary web script or HTML.;;CVE-2016-2041;phpMyAdmin does not use a constant-time algorithm for comparing;CSRF tokens, which makes it easier for remote attackers to bypass;intended access restrictions by measuring time differences.;;CVE-2016-2560;Multiple cross-site scripting (XSS) vulnerabilities allow remote;attackers to inject arbitrary web script or HTML.;;CVE-2016-2561;Multiple cross-site scripting (XSS) vulnerabilities allow remote;attackers to inject arbitrary web script or HTML.;;CVE-2016-5099;Multiple cross-site scripting (XSS) vulnerabilities allow remote;attackers to inject arbitrary web script or HTML.;;CVE-2016-5701;For installations running on plain HTTP, phpMyAdmin allows remote;attackers to conduct BBCode injection attacks against HTTP sessions;via a crafted URI.;;CVE-2016-5705;Multiple cross-site scripting (XSS) vulnerabilities allow remote;attackers to inject arbitrary web script or HTML.;;CVE-2016-5706;phpMyAdmin allows remote attackers to cause a denial of service;(resource consumption) via a large array in the scripts parameter.;;CVE-2016-5731;A cross-site scripting (XSS) vulnerability allows remote;attackers to inject arbitrary web script or HTML.;;CVE-2016-5733;Multiple cross-site scripting (XSS) vulnerabilities allow remote;attackers to inject arbitrary web script or HTML.;;CVE-2016-5739;A specially crafted Transformation could leak information which;a remote attacker could use to perform cross site request forgeries. |
Description: | Summary: Several vulnerabilities have been fixed in phpMyAdmin, the web-based MySQL administration interface. CVE-2016-1927 The suggestPassword function relied on a non-secure random number generator which makes it easier for remote attackers to guess generated passwords via a brute-force approach. CVE-2016-2039 CSRF token values were generated by a non-secure random number generator, which allows remote attackers to bypass intended access restrictions by predicting a value. CVE-2016-2040 Multiple cross-site scripting (XSS) vulnerabilities allow remote authenticated users to inject arbitrary web script or HTML. CVE-2016-2041 phpMyAdmin does not use a constant-time algorithm for comparing CSRF tokens, which makes it easier for remote attackers to bypass intended access restrictions by measuring time differences. CVE-2016-2560 Multiple cross-site scripting (XSS) vulnerabilities allow remote attackers to inject arbitrary web script or HTML. CVE-2016-2561 Multiple cross-site scripting (XSS) vulnerabilities allow remote attackers to inject arbitrary web script or HTML. CVE-2016-5099 Multiple cross-site scripting (XSS) vulnerabilities allow remote attackers to inject arbitrary web script or HTML. CVE-2016-5701 For installations running on plain HTTP, phpMyAdmin allows remote attackers to conduct BBCode injection attacks against HTTP sessions via a crafted URI. CVE-2016-5705 Multiple cross-site scripting (XSS) vulnerabilities allow remote attackers to inject arbitrary web script or HTML. CVE-2016-5706 phpMyAdmin allows remote attackers to cause a denial of service (resource consumption) via a large array in the scripts parameter. CVE-2016-5731 A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML. CVE-2016-5733 Multiple cross-site scripting (XSS) vulnerabilities allow remote attackers to inject arbitrary web script or HTML. CVE-2016-5739 A specially crafted Transformation could leak information which a remote attacker could use to perform cross site request forgeries. Affected Software/OS: phpmyadmin on Debian Linux Solution: For the stable distribution (jessie), these problems have been fixed in version 4:4.2.12-2+deb8u2. For the unstable distribution (sid), these problems have been fixed in version 4:4.6.3-1. We recommend that you upgrade your phpmyadmin packages. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-1927 Debian Security Information: DSA-3627 (Google Search) http://www.debian.org/security/2016/dsa-3627 http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176483.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176739.html SuSE Security Announcement: openSUSE-SU-2016:0357 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-02/msg00028.html SuSE Security Announcement: openSUSE-SU-2016:0378 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-02/msg00049.html Common Vulnerability Exposure (CVE) ID: CVE-2016-2039 Common Vulnerability Exposure (CVE) ID: CVE-2016-2040 Common Vulnerability Exposure (CVE) ID: CVE-2016-2041 Common Vulnerability Exposure (CVE) ID: CVE-2016-2560 http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178869.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178562.html SuSE Security Announcement: openSUSE-SU-2016:0663 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-03/msg00018.html SuSE Security Announcement: openSUSE-SU-2016:0666 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-03/msg00020.html Common Vulnerability Exposure (CVE) ID: CVE-2016-2561 Common Vulnerability Exposure (CVE) ID: CVE-2016-5099 BugTraq ID: 90877 http://www.securityfocus.com/bid/90877 https://security.gentoo.org/glsa/201701-32 http://www.securitytracker.com/id/1035979 SuSE Security Announcement: openSUSE-SU-2016:1556 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-06/msg00043.html Common Vulnerability Exposure (CVE) ID: CVE-2016-5701 BugTraq ID: 91383 http://www.securityfocus.com/bid/91383 SuSE Security Announcement: openSUSE-SU-2016:1699 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html SuSE Security Announcement: openSUSE-SU-2016:1700 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html Common Vulnerability Exposure (CVE) ID: CVE-2016-5705 BugTraq ID: 91378 http://www.securityfocus.com/bid/91378 Common Vulnerability Exposure (CVE) ID: CVE-2016-5706 BugTraq ID: 91376 http://www.securityfocus.com/bid/91376 Common Vulnerability Exposure (CVE) ID: CVE-2016-5731 Common Vulnerability Exposure (CVE) ID: CVE-2016-5733 BugTraq ID: 91390 http://www.securityfocus.com/bid/91390 Common Vulnerability Exposure (CVE) ID: CVE-2016-5739 BugTraq ID: 91389 http://www.securityfocus.com/bid/91389 |
Copyright | Copyright (C) 2016 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |