Security update of phpmyadmin for wheezy
Hi Thijs and LTS team
I have prepared a security update of phpmyadmin for wheezy.
The prepared packages are available here:
For more information see here:
The debdiff is available in the same place:
I have corrected the following problems by backporting the patches
given by upstream (you can find the upstream reference in the patch
file in the debdiff above).
A pair of vulnerabilities were found affecting the way cookies are stored.
The decryption of the username/password is vulnerable to a padding
oracle attack. The can allow an attacker who has access to a user's
browser cookie file to decrypt the username and password.
A vulnerability was found where the same initialization vector (IV) is
used to hash the username and password stored in the phpMyAdmin
cookie. If a user has the same password as their username, an attacker
who examines the browser cookie can see that they are the same — but
the attacker can not directly decode these values from the cookie as
it is still hashed.
XSS in replication feature
A vulnerability was found where a specially crafted database name
could be used to run arbitrary PHP commands through the array export
A vulnerability was reported where a specially crafted database and/or
table name can be used to trigger an SQL injection attack through the
A vulnerability was discovered where a user can exploit the LOAD LOCAL
INFILE functionality to expose files on the server to the database
A vulnerability was found where a user can specially craft a symlink
on disk, to a file which phpMyAdmin is permitted to read but the user
is not, which phpMyAdmin will then expose to the user.
A vulnerability was reported with the %u username replacement
functionality of the SaveDir and UploadDir features. When the username
substitution is configured, a specially-crafted user name can be used
to circumvent restrictions to traverse the file system.
A vulnerability was reported where some data is passed to the PHP
unserialize() function without verification that it's valid serialized
data. Due to how the PHP function operates, unserialization can result
in code being loaded and executed due to object instantiation and
autoloading, and a malicious user may be able to exploit this.
Therefore, a malicious user may be able to manipulate the stored data
in a way to exploit this weakness.
A vulnerability was discovered where an unauthenticated user is able
to execute a denial-of-service (DOS) attack by forcing persistent
connections when phpMyAdmin is running with
A vulnerability has been reported where a malicious authorized user
can cause a denial-of-service (DOS) attack on a server by passing
large values to a loop.
A vulnerability was discovered where, under certain circumstances, it
may be possible to circumvent the phpMyAdmin IP-based authentication
When phpMyAdmin is used with IPv6 in a proxy server environment, and
the proxy server is in the allowed range but the attacking computer is
not allowed, this vulnerability can allow the attacking computer to
connect despite the IP rules.
An authenticated user can trigger a denial-of-service (DOS) attack by
entering a very long password at the change password dialog.
A vulnerability was discovered where a user can execute a remote code
execution attack against a server when phpMyAdmin is being run as a
CGI application. Under certain server configurations, a user can pass
a query string which is executed as a command-line argument by the
In addition to the above I have marked a few CVEs as not vulnerable or
not worth the effort to update because the severity of the issue is
CVE-2016-6610 Vulnerable code not present
CVE-2016-6615 Vulnerable code not present
CVE-2016-6618 Vulnerable code not present
CVE-2016-6619 Vulnerable code not present
CVE-2016-6626 Vulnerable code not present. However I'm not 100% sure
about this one.
CVE-2016-6628 Vulnerable code not present
CVE-2016-6629 Vulnerable code not present
CVE-2016-6632 Vulnerable code not present
CVE-2016-6625 Not critical. Marked as no-dsa.
CVE-2016-6627 Not critical. Marked as no-dsa.
Please let me know if you think I have made an error in the analysis of this.
There is also one CVE (CVE-2016-6621) that we do not fully know
whether it is solved or not. I have not made a specific fix in this
upload. Salvatore is involved in this investigation too.
I have regression tested the package but I have not explicitly tried
to exploit the vulnerabilities yet. I will only try to exploit the
most important ones. I have checked that some of them actually give a
different output which means that they should be fixed. Some of the
issues were simple to verify by desk-check (they must have been found
using desk-check too).
In any case the corrected package seem to work find with basic
operations like viewing and updating things.
If there are no objections I will upload the corrected package to
wheezy-security in three days, that is on Saturday this week.
--- Inguza Technology AB --- MSc in Information Technology ----
/ email@example.com Folkebogatan 26 \
| firstname.lastname@example.org 654 68 KARLSTAD |
| http://inguza.com/ Mobile: +46 (0)70-332 1551 |
\ gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9 /