[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2009/dsa-1918.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1918.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1918.wml	2016-10-22 10:46:44.204140751 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in phpMyAdmin, a tool
- -to administer MySQL over the web. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? phpMyAdmin, веб-инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? MySQL, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3696";>CVE-2009-3696</a>
 
- -  <p>Cross-site scripting (XSS) vulnerability allows remote attackers to
- -  inject arbitrary web script or HTML via a crafted MySQL table name.</p></li>
+  <p>Ð?ежÑ?айÑ?оÑ?й Ñ?кÑ?ипÑ?инг (XSS) позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+  вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного имени Ñ?аблиÑ?Ñ? MySQL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3697";>CVE-2009-3697</a>
 
- -  <p>SQL injection vulnerability in the PDF schema generator functionality 
- -  allows remote attackers to execute arbitrary SQL commands. This issue
- -  does not apply to the version in Debian 4.0 Etch.</p></li>
+  <p>SQL-инÑ?екÑ?иÑ? в Ñ?Ñ?нкÑ?ионалÑ?ноÑ?Ñ?и генеÑ?аÑ?оÑ?а PDF-Ñ?Ñ?ем
+  позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е SQL-командÑ?. ЭÑ?а пÑ?облема
+  не каÑ?аеÑ?Ñ?Ñ? веÑ?Ñ?ии в Debian 4.0 Etch.</p></li>
 
 </ul>
 
- -<p>Additionally, extra fortification has been added for the web based setup.php
- -script. Although the shipped web server configuration should ensure that
- -this script is protected, in practice this turned out not always to be the
- -case. The config.inc.php file is not writable anymore by the webserver user.
- -See README.Debian for details on how to enable the setup.php
- -script if and when you need it.</p>
+<p>Ð?Ñ?оме Ñ?ого, бÑ?ли добавленÑ? дополниÑ?елÑ?нÑ?е заÑ?иÑ?Ñ? длÑ? веб-Ñ?Ñ?енаÑ?иÑ?
+setup.php. ХоÑ?Ñ? поÑ?Ñ?авлÑ?емаÑ? наÑ?Ñ?Ñ?ойка веб-Ñ?еÑ?веÑ?а должна гаÑ?анÑ?иÑ?оваÑ?Ñ?, Ñ?Ñ?о
+Ñ?Ñ?оÑ? Ñ?Ñ?енаÑ?ий заÑ?иÑ?Ñ?н, на пÑ?акÑ?ике оказÑ?ваеÑ?Ñ?Ñ?, Ñ?Ñ?о Ñ?Ñ?о не вÑ?егда Ñ?ак. Файл
+config.inc.php более не доÑ?Ñ?Ñ?пен длÑ? запиÑ?и полÑ?зоваÑ?елÑ?, оÑ? коÑ?оÑ?ого запÑ?Ñ?каеÑ?Ñ?Ñ?
+веб-Ñ?еÑ?веÑ?. Ð?одÑ?обноÑ?Ñ?и о Ñ?ом, как вклÑ?Ñ?иÑ?Ñ? Ñ?Ñ?енаÑ?ий setup.php, еÑ?ли он вам нÑ?жен,
+Ñ?моÑ?Ñ?иÑ?е в Ñ?айле README.Debian.</p>
 
 
- -<p>For the old stable distribution (etch), these problems have been fixed in
- -version 2.9.1.1-13.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.9.1.1-13.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.11.8.1-5+lenny3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.11.8.1-5+lenny3.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 3.2.2.1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.2.2.1-1.</p>
 
- -<p>We recommend that you upgrade your phpmyadmin package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? phpmyadmin.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJYCv1GAAoJEF7nbuICFtKlglcP/1kFJd9IHVzPzXvLjrv23MN6
3671AmkrLWSQFfgHlVMGnNde6VAJ+i9tRvFWnTVKLvWGTDtxWUizfeD754X4P52U
cs5cq3tt1vKbxrdhlTFqf331mLrj9JzNlE34PobGj2lwuRb9FBCClgzO/poEEp2p
GyPNYKXL96Wjd9xVSegZx5411Gj2VHBOGs9oe67NNgnyRSlWZoIb1ikzWK6l1MU8
MnS2o0QaLyHEow/lAAWpYCDgchVPbz2IRsINxNBgJ4p43JkyBR5QcRRkudWMKE7W
2/BnHg3/pFZUAOOZQjytXRTOEP848kJ7rD6av9HRfqUX/dKK2Lel2dN22cH+nKJD
xOLILadwPTnPmP/skYWpbfatw4Kn6FVDUgkHfpcUjHF9AwCJujUu7M4VXMbtnsTE
jE0vLLM/8LrN+w98iWNrqp91fyn+xCHmGWIi3TZQHpHQp9kQBEAjNd4cLUGmMqyJ
zJ887uTJTyNeQz+XLl6uogHJwgJ2fgBvXoD++NUmkMgiqm94M2UkEdQBl9gYL2p7
pMVv0GulNXuyQBkgOv5AMQFRp9V+uvjP5V1zmUJX5NZl1c7zLdy4owGXRVbkTuCa
wM9oT4T6xSovw/7c2pdq5cj3yVWbNhJ7gf+FIXTU7dWE+hEfJ2tLxAS6gDOghuoL
pzz6L4bLebe0TMuarxTn
=0yLj
-----END PGP SIGNATURE-----


Reply to: