aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--databases/phpmyadmin/Makefile2
-rw-r--r--databases/phpmyadmin/distinfo4
-rw-r--r--security/vuxml/vuln.xml53
3 files changed, 56 insertions, 3 deletions
diff --git a/databases/phpmyadmin/Makefile b/databases/phpmyadmin/Makefile
index eeb1c8faefda..668c08de93af 100644
--- a/databases/phpmyadmin/Makefile
+++ b/databases/phpmyadmin/Makefile
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= phpMyAdmin
-DISTVERSION= 3.5.8
+DISTVERSION= 3.5.8.1
CATEGORIES= databases www
MASTER_SITES= SF/${PORTNAME:L}/${PORTNAME}/${DISTVERSION}
DISTNAME= ${PORTNAME}-${DISTVERSION}-all-languages
diff --git a/databases/phpmyadmin/distinfo b/databases/phpmyadmin/distinfo
index e80a299089e7..17dea4bc61b4 100644
--- a/databases/phpmyadmin/distinfo
+++ b/databases/phpmyadmin/distinfo
@@ -1,2 +1,2 @@
-SHA256 (phpMyAdmin-3.5.8-all-languages.tar.xz) = 0766acb45d862ca802b5d3018f240bdd0a14749e21f40ebabe51bf25d6088409
-SIZE (phpMyAdmin-3.5.8-all-languages.tar.xz) = 3744780
+SHA256 (phpMyAdmin-3.5.8.1-all-languages.tar.xz) = c66737ff55369b1c9e4b116e68f3c517faf7c4bc17e289d008d74fde6c8260f6
+SIZE (phpMyAdmin-3.5.8.1-all-languages.tar.xz) = 3744808
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 0616943b682a..1742f0e7dfd0 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,59 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="8c8fa44d-ad15-11e2-8cea-6805ca0b3d42">
+ <topic>phpMyAdmin -- Multiple security vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>phpMyAdmin</name>
+ <range><ge>3.5</ge><lt>3.5.8.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The phpMyAdmin development team reports:</p>
+ <blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2013-2.php">
+ <p>In some PHP versions, the preg_replace() function can be
+ tricked into executing arbitrary PHP code on the
+ server. This is done by passing a crafted argument as the
+ regular expression, containing a null byte. phpMyAdmin does
+ not correctly sanitize an argument passed to preg_replace()
+ when using the "Replace table prefix" feature, opening the
+ way to this vulnerability..</p>
+ <p>This vulnerability can be triggered only by someone who
+ logged in to phpMyAdmin, as the usual token protection
+ prevents non-logged-in users to access the required
+ form.</p>
+ </blockquote>
+ <blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php">
+ <p>phpMyAdmin can be configured to save an export file on
+ the web server, via its SaveDir directive. With this in
+ place, it's possible, either via a crafted filename template
+ or a crafted table name, to save a double extension file
+ like foobar.php.sql. In turn, an Apache webserver on which
+ there is no definition for the MIME type "sql" (the default)
+ will treat this saved file as a ".php" script, leading to
+ remote code execution.</p>
+ <p>This vulnerability can be triggered only by someone who
+ logged in to phpMyAdmin, as the usual token protection
+ prevents non-logged-in users to access the required
+ form. Moreover, the SaveDir directive is empty by default,
+ so a default configuration is not vulnerable. The
+ $cfg['SaveDir'] directive must be configured, and the server
+ must be running Apache with mod_mime to be exploitable.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-3238</cvename>
+ <cvename>CVE-2013-3239</cvename>
+ </references>
+ <dates>
+ <discovery>2013-04-24</discovery>
+ <entry>2013-04-24</entry>
+ </dates>
+ </vuln>
+
<vuln vid="aeb962f6-ab8d-11e2-b3f5-003067c2616f">
<topic>tinc -- Buffer overflow</topic>
<affects>