872 lines
50 KiB
JSON
872 lines
50 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20141591",
|
|
"Version": "oval:org.altlinux.errata:def:20141591",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2014-1591: package `phpMyAdmin` update to version 4.1.14-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p11"
|
|
],
|
|
"Products": [
|
|
"ALT Container"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2014-1591",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2014-1591",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1879",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1879",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2206",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2206",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3902",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3902",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3903",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3903",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8669",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8669",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2560",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2560",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-4412",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4412",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5701",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5701",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5706",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5706",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5730",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5730",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5731",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5731",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5733",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5733",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5734",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5734",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5739",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5739",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6606",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6606",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6607",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6607",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6609",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6609",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6610",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6610",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6611",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6611",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6612",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6612",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6613",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6613",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6614",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6614",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6618",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6618",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6619",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6619",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6620",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6620",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6621",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6621",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6622",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6622",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6623",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6623",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6624",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6624",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6625",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6625",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6626",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6626",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6627",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6627",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6628",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6628",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6629",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6629",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6630",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6630",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6631",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6631",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6632",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6632",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6633",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6633",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9847",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9847",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9848",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9848",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9849",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9849",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9850",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9850",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9856",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9856",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9857",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9857",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9858",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9858",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9859",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9859",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9860",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9860",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9861",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9861",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9864",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9864",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9865",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9865",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9866",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9866",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-1000013",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000013",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-1000014",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000014",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-1000015",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000015",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-1000017",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000017",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-1000018",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000018",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-18264",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-18264",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades phpMyAdmin to version 4.1.14-alt1. \nSecurity Fix(es):\n\n * CVE-2014-1879: Cross-site scripting (XSS) vulnerability in import.php in phpMyAdmin before 4.1.7 allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename in an import action.\n\n * CVE-2015-2206: libraries/select_lang.lib.php in phpMyAdmin 4.0.x before 4.0.10.9, 4.2.x before 4.2.13.2, and 4.3.x before 4.3.11.1 includes invalid language values in unknown-language error responses that contain a CSRF token and may be sent with HTTP compression, which makes it easier for remote attackers to conduct a BREACH attack and determine this token via a series of crafted requests.\n\n * CVE-2015-3902: Multiple cross-site request forgery (CSRF) vulnerabilities in the setup process in phpMyAdmin 4.0.x before 4.0.10.10, 4.2.x before 4.2.13.3, 4.3.x before 4.3.13.1, and 4.4.x before 4.4.6.1 allow remote attackers to hijack the authentication of administrators for requests that modify the configuration file.\n\n * CVE-2015-3903: libraries/Config.class.php in phpMyAdmin 4.0.x before 4.0.10.10, 4.2.x before 4.2.13.3, 4.3.x before 4.3.13.1, and 4.4.x before 4.4.6.1 disables X.509 certificate verification for GitHub API calls over SSL, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.\n\n * CVE-2015-8669: libraries/config/messages.inc.php in phpMyAdmin 4.0.x before 4.0.10.12, 4.4.x before 4.4.15.2, and 4.5.x before 4.5.3.1 allows remote attackers to obtain sensitive information via a crafted request, which reveals the full path in an error message.\n\n * CVE-2016-2560: Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.15, 4.4.x before 4.4.15.5, and 4.5.x before 4.5.5.1 allow remote attackers to inject arbitrary web script or HTML via (1) a crafted Host HTTP header, related to libraries/Config.class.php; (2) crafted JSON data, related to file_echo.php; (3) a crafted SQL query, related to js/functions.js; (4) the initial parameter to libraries/server_privileges.lib.php in the user accounts page; or (5) the it parameter to libraries/controllers/TableSearchController.class.php in the zoom search page.\n\n * CVE-2016-4412: An issue was discovered in phpMyAdmin. A user can be tricked into following a link leading to phpMyAdmin, which after authentication redirects to another malicious site. The attacker must sniff the user's valid phpMyAdmin token. All 4.0.x versions (prior to 4.0.10.16) are affected.\n\n * CVE-2016-5701: setup/frames/index.inc.php in phpMyAdmin 4.0.10.x before 4.0.10.16, 4.4.15.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to conduct BBCode injection attacks against HTTP sessions via a crafted URI.\n\n * CVE-2016-5706: js/get_scripts.js.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to cause a denial of service via a large array in the scripts parameter.\n\n * CVE-2016-5730: phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to obtain sensitive information via vectors involving (1) an array value to FormDisplay.php, (2) incorrect data to validate.php, (3) unexpected data to Validator.php, (4) a missing config directory during setup, or (5) an incorrect OpenID identifier data type, which reveals the full path in an error message.\n\n * CVE-2016-5731: Cross-site scripting (XSS) vulnerability in examples/openid.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via vectors involving an OpenID error message.\n\n * CVE-2016-5733: Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) a crafted table name that is mishandled during privilege checking in table_row.phtml, (2) a crafted mysqld log_bin directive that is mishandled in log_selector.phtml, (3) the Transformation implementation, (4) AJAX error handling in js/ajax.js, (5) the Designer implementation, (6) the charts implementation in js/tbl_chart.js, or (7) the zoom-search implementation in rows_zoom.phtml.\n\n * CVE-2016-5734: phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.\n\n * CVE-2016-5739: The Transformation implementation in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not use the no-referrer Content Security Policy (CSP) protection mechanism, which makes it easier for remote attackers to conduct CSRF attacks by reading an authentication token in a Referer header, related to libraries/Header.php.\n\n * CVE-2016-6606: An issue was discovered in cookie encryption in phpMyAdmin. The decryption of the username/password is vulnerable to a padding oracle attack. This can allow an attacker who has access to a user's browser cookie file to decrypt the username and password. Furthermore, the same initialization vector (IV) is used to hash the username and password stored in the phpMyAdmin cookie. If a user has the same password as their username, an attacker who examines the browser cookie can see that they are the same - but the attacker can not directly decode these values from the cookie as it is still hashed. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6607: XSS issues were discovered in phpMyAdmin. This affects Zoom search (specially crafted column content can be used to trigger an XSS attack); GIS editor (certain fields in the graphical GIS editor are not properly escaped and can be used to trigger an XSS attack); Relation view; the following Transformations: Formatted, Imagelink, JPEG: Upload, RegexValidation, JPEG inline, PNG inline, and transformation wrapper; XML export; MediaWiki export; Designer; When the MySQL server is running with a specially-crafted log_bin directive; Database tab; Replication feature; and Database search. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6609: An issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6610: A full path disclosure vulnerability was discovered in phpMyAdmin where a user can trigger a particular error in the export mechanism to discover the full path of phpMyAdmin on the disk. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6611: An issue was discovered in phpMyAdmin. A specially crafted database and/or table name can be used to trigger an SQL injection attack through the export functionality. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6612: An issue was discovered in phpMyAdmin. A user can exploit the LOAD LOCAL INFILE functionality to expose files on the server to the database system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6613: An issue was discovered in phpMyAdmin. A user can specially craft a symlink on disk, to a file which phpMyAdmin is permitted to read but the user is not, which phpMyAdmin will then expose to the user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6614: An issue was discovered in phpMyAdmin involving the %u username replacement functionality of the SaveDir and UploadDir features. When the username substitution is configured, a specially-crafted user name can be used to circumvent restrictions to traverse the file system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6618: An issue was discovered in phpMyAdmin. The transformation feature allows a user to trigger a denial-of-service (DoS) attack against the server. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6619: An issue was discovered in phpMyAdmin. In the user interface preference feature, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6620: An issue was discovered in phpMyAdmin. Some data is passed to the PHP unserialize() function without verification that it's valid serialized data. The unserialization can result in code execution because of the interaction with object instantiation and autoloading. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6621: The setup script for phpMyAdmin before 4.0.10.19, 4.4.x before 4.4.15.10, and 4.6.x before 4.6.6 allows remote attackers to conduct server-side request forgery (SSRF) attacks via unspecified vectors.\n\n * CVE-2016-6622: An issue was discovered in phpMyAdmin. An unauthenticated user is able to execute a denial-of-service (DoS) attack by forcing persistent connections when phpMyAdmin is running with $cfg['AllowArbitraryServer']=true. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6623: An issue was discovered in phpMyAdmin. An authorized user can cause a denial-of-service (DoS) attack on a server by passing large values to a loop. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6624: An issue was discovered in phpMyAdmin involving improper enforcement of the IP-based authentication rules. When phpMyAdmin is used with IPv6 in a proxy server environment, and the proxy server is in the allowed range but the attacking computer is not allowed, this vulnerability can allow the attacking computer to connect despite the IP rules. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6625: An issue was discovered in phpMyAdmin. An attacker can determine whether a user is logged in to phpMyAdmin. The user's session, username, and password are not compromised by this vulnerability. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6626: An issue was discovered in phpMyAdmin. An attacker could redirect a user to a malicious web page. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6627: An issue was discovered in phpMyAdmin. An attacker can determine the phpMyAdmin host location through the file url.php. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6628: An issue was discovered in phpMyAdmin. An attacker may be able to trigger a user to download a specially crafted malicious SVG file. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6629: An issue was discovered in phpMyAdmin involving the $cfg['ArbitraryServerRegexp'] configuration directive. An attacker could reuse certain cookie values in a way of bypassing the servers defined by ArbitraryServerRegexp. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6630: An issue was discovered in phpMyAdmin. An authenticated user can trigger a denial-of-service (DoS) attack by entering a very long password at the change password dialog. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6631: An issue was discovered in phpMyAdmin. A user can execute a remote code execution attack against a server when phpMyAdmin is being run as a CGI application. Under certain server configurations, a user can pass a query string which is executed as a command-line argument by the file generator_plugin.sh. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6632: An issue was discovered in phpMyAdmin where, under certain conditions, phpMyAdmin may not delete temporary files during the import of ESRI files. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-6633: An issue was discovered in phpMyAdmin. phpMyAdmin can be used to trigger a remote code execution attack against certain PHP installations that are running with the dbase extension. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\n\n * CVE-2016-9847: An issue was discovered in phpMyAdmin. When the user does not specify a blowfish_secret key for encrypting cookies, phpMyAdmin generates one at runtime. A vulnerability was reported where the way this value is created uses a weak algorithm. This could allow an attacker to determine the user's blowfish_secret and potentially decrypt their cookies. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2016-9848: An issue was discovered in phpMyAdmin. phpinfo (phpinfo.php) shows PHP information including values of HttpOnly cookies. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2016-9849: An issue was discovered in phpMyAdmin. It is possible to bypass AllowRoot restriction ($cfg['Servers'][$i]['AllowRoot']) and deny rules for username by using Null Byte in the username. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2016-9850: An issue was discovered in phpMyAdmin. Username matching for the allow/deny rules may result in wrong matches and detection of the username in the rule due to non-constant execution time. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2016-9856: An XSS issue was discovered in phpMyAdmin because of an improper fix for CVE-2016-2559 in PMASA-2016-10. This issue is resolved by using a copy of a hash to avoid a race condition. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2016-9857: An issue was discovered in phpMyAdmin. XSS is possible because of a weakness in a regular expression used in some JavaScript processing. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2016-9858: An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to initiate a denial of service attack in saved searches feature. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2016-9859: An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to initiate a denial of service attack in import feature. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2016-9860: An issue was discovered in phpMyAdmin. An unauthenticated user can execute a denial of service attack when phpMyAdmin is running with $cfg['AllowArbitraryServer']=true. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2016-9861: An issue was discovered in phpMyAdmin. Due to the limitation in URL matching, it was possible to bypass the URL white-list protection. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2016-9864: An issue was discovered in phpMyAdmin. With a crafted username or a table name, it was possible to inject SQL statements in the tracking functionality that would run with the privileges of the control user. This gives read and write access to the tables of the configuration storage database, and if the control user has the necessary privileges, read access to some tables of the MySQL database. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2016-9865: An issue was discovered in phpMyAdmin. Due to a bug in serialized string parsing, it was possible to bypass the protection offered by PMA_safeUnserialize() function. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2016-9866: An issue was discovered in phpMyAdmin. When the arg_separator is different from its default \u0026 value, the CSRF token was not properly stripped from the return URL of the preference import action. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.\n\n * CVE-2017-1000013: phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to an open redirect weakness\n\n * CVE-2017-1000014: phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a DOS weakness in the table editing functionality\n\n * CVE-2017-1000015: phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a CSS injection attack through crafted cookie parameters\n\n * CVE-2017-1000017: phpMyAdmin 4.0, 4.4 and 4.6 are vulnerable to a weakness where a user with appropriate permissions is able to connect to an arbitrary MySQL server\n\n * CVE-2017-1000018: phpMyAdmin 4.0, 4.4., and 4.6 are vulnerable to a DOS attack in the replication status by using a specially crafted table name\n\n * CVE-2017-18264: An issue was discovered in libraries/common.inc.php in phpMyAdmin 4.0 before 4.0.10.20, 4.4.x, 4.6.x, and 4.7.0 prereleases. The restrictions caused by $cfg['Servers'][$i]['AllowNoPassword'] = false are bypassed under certain PHP versions (e.g., version 5). This can allow the login of users who have no password set even if the administrator has set $cfg['Servers'][$i]['AllowNoPassword'] to false (which is also the default). This occurs because some implementations of the PHP substr function return false when given '' as the first argument.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2014-05-05"
|
|
},
|
|
"Updated": {
|
|
"Date": "2014-05-05"
|
|
},
|
|
"BDUs": null,
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2014-1879",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1879",
|
|
"Impact": "Low",
|
|
"Public": "20140220"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2206",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2206",
|
|
"Impact": "Low",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3902",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-352",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3902",
|
|
"Impact": "Low",
|
|
"Public": "20150526"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3903",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-310",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3903",
|
|
"Impact": "Low",
|
|
"Public": "20150526"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8669",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8669",
|
|
"Impact": "Low",
|
|
"Public": "20151226"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2560",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2560",
|
|
"Impact": "Low",
|
|
"Public": "20160301"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-4412",
|
|
"CVSS": "AV:N/AC:H/Au:S/C:P/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4412",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5701",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-74",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5701",
|
|
"Impact": "Low",
|
|
"Public": "20160703"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5706",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5706",
|
|
"Impact": "High",
|
|
"Public": "20160703"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5730",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5730",
|
|
"Impact": "Low",
|
|
"Public": "20160703"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5731",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5731",
|
|
"Impact": "Low",
|
|
"Public": "20160703"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5733",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5733",
|
|
"Impact": "Low",
|
|
"Public": "20160703"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5734",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-94",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5734",
|
|
"Impact": "Critical",
|
|
"Public": "20160703"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5739",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5739",
|
|
"Impact": "High",
|
|
"Public": "20160703"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6606",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-310",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6606",
|
|
"Impact": "High",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6607",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6607",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6609",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-77",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6609",
|
|
"Impact": "High",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6610",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6610",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6611",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-89",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6611",
|
|
"Impact": "High",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6612",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6612",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6613",
|
|
"CVSS": "AV:N/AC:H/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6613",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6614",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
|
"CWE": "CWE-22",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6614",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6618",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6618",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6619",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-89",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6619",
|
|
"Impact": "High",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6620",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-502",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6620",
|
|
"Impact": "Critical",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6621",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
|
"CWE": "CWE-918",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6621",
|
|
"Impact": "High",
|
|
"Public": "20170131"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6622",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6622",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6623",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6623",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6624",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6624",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6625",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6625",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6626",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6626",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6627",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6627",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6628",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6628",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6629",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6629",
|
|
"Impact": "Critical",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6630",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6630",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6631",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-78",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6631",
|
|
"Impact": "High",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6632",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6632",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6633",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6633",
|
|
"Impact": "High",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9847",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-310",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9847",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9848",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9848",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9849",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9849",
|
|
"Impact": "Critical",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9850",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9850",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9856",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9856",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9857",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9857",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9858",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9858",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9859",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9859",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9860",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9860",
|
|
"Impact": "Low",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9861",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9861",
|
|
"Impact": "High",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9864",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-89",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9864",
|
|
"Impact": "High",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9865",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9865",
|
|
"Impact": "Critical",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9866",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-352",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9866",
|
|
"Impact": "Critical",
|
|
"Public": "20161211"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-1000013",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-601",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000013",
|
|
"Impact": "Low",
|
|
"Public": "20170717"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-1000014",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000014",
|
|
"Impact": "High",
|
|
"Public": "20170717"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-1000015",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000015",
|
|
"Impact": "Low",
|
|
"Public": "20170717"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-1000017",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-918",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000017",
|
|
"Impact": "High",
|
|
"Public": "20170717"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-1000018",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000018",
|
|
"Impact": "High",
|
|
"Public": "20170717"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-18264",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-18264",
|
|
"Impact": "Critical",
|
|
"Public": "20180501"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:container:11"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20141591001",
|
|
"Comment": "phpMyAdmin is earlier than 0:4.1.14-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20141591002",
|
|
"Comment": "phpMyAdmin-apache is earlier than 0:4.1.14-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20141591003",
|
|
"Comment": "phpMyAdmin-apache2 is earlier than 0:4.1.14-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |