[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-1207.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- ../../english/security/2006/dsa-1207.wml	2017-11-01 10:11:09.623798575 +0500
+++ 2006/dsa-1207.wml	2018-03-26 23:12:24.741996481 +0500
@@ -1,57 +1,57 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" mindelta="1"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>The phpmyadmin update in DSA 1207 introduced a regression. This update
- -corrects this flaw. For completeness, please find below the original
- -advisory text:</p>
+<p>Ð?бновление phpmyadmin в Ñ?екомендаÑ?ии DSA-1207 Ñ?одеÑ?жиÑ? Ñ?егÑ?еÑ?Ñ?иÑ?. Ð?анное обновление
+иÑ?пÑ?авлÑ?еÑ? Ñ?Ñ?Ñ? оÑ?ибкÑ?. Ð?лÑ? полноÑ?Ñ? ниже пÑ?иводиÑ?Ñ?Ñ? Ñ?екÑ?Ñ? изнаÑ?алÑ?ной
+Ñ?екомендаÑ?ии:</p>
 
 <blockquote>
- -<p>Several remote vulnerabilities have been discovered in phpMyAdmin, a
- -program to administrate MySQL over the web. The Common Vulnerabilities
- -and Exposures project identifies the following problems:</p>
+<p>Ð? phpMyAdmin, пÑ?огÑ?амме длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? MySQL Ñ?еÑ?ез веб, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3621";>CVE-2005-3621</a>
 
- -    <p>CRLF injection vulnerability allows remote attackers to conduct
- -    HTTP response splitting attacks.</p></li>
+    <p>CRLF-инÑ?екÑ?иÑ? позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ?
+    аÑ?аки по Ñ?азделениÑ? HTTP-оÑ?веÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3665";>CVE-2005-3665</a>
 
- -    <p>Multiple cross-site scripting (XSS) vulnerabilities allow remote
- -    attackers to inject arbitrary web script or HTML via the (1) HTTP_HOST
- -    variable and (2) various scripts in the libraries directory that
- -    handle header generation.</p></li>
+    <p>Ð?ногоÑ?иÑ?леннÑ?е Ñ?лÑ?Ñ?аи межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга (XSS) позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? (1) пеÑ?еменной
+    HTTP_HOST и (2) Ñ?азлиÑ?нÑ?Ñ? Ñ?Ñ?енаÑ?иев в каÑ?алоге libraries, обÑ?абаÑ?Ñ?ваÑ?Ñ?иÑ?
+    Ñ?оздание заголовков.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1678";>CVE-2006-1678</a>
 
- -    <p>Multiple cross-site scripting (XSS) vulnerabilities allow remote
- -    attackers to inject arbitrary web script or HTML via scripts in the
- -    themes directory.</p></li>
+    <p>Ð?ногоÑ?иÑ?леннÑ?е Ñ?лÑ?Ñ?ае межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга (XSS) позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? Ñ?Ñ?енаÑ?иев
+    в каÑ?алоге themes.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2418";>CVE-2006-2418</a>
 
- -    <p>A cross-site scripting (XSS) vulnerability allows remote attackers
- -    to inject arbitrary web script or HTML via the db parameter of
+    <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг (XSS) позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? паÑ?амеÑ?Ñ?а db длÑ?
     footer.inc.php.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5116";>CVE-2006-5116</a>
 
- -    <p>A remote attacker could overwrite internal variables through the
- -    _FILES global variable.</p></li>
+    <p>УдалÑ?ннÑ?Ñ? злоÑ?мÑ?Ñ?ленник можеÑ? пеÑ?езапиÑ?аÑ?Ñ? внÑ?Ñ?Ñ?енние пеÑ?еменнÑ?е Ñ? помоÑ?Ñ?Ñ?
+    глобалÑ?ной пеÑ?еменной _FILES.</p></li>
 
 </ul>
 </blockquote>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
 version 2.6.2-3sarge3.</p>
 
- -<p>For the upcoming stable release (etch) and unstable distribution (sid)
- -these problems have been fixed in version 2.9.0.3-1.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном (etch) and неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в version 2.9.0.3-1.</p>
 
- -<p>We recommend that you upgrade your phpmyadmin package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? phpmyadmin.</p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2006/dsa-1207.data"
- -# $Id: dsa-1207.wml,v 1.4 2014/04/30 07:16:10 pabs Exp $
-----BEGIN PGP SIGNATURE-----
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=R+sc
-----END PGP SIGNATURE-----


Reply to: