Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0903192009040.13013@faron.mitre.org>
Date: Thu, 19 Mar 2009 20:09:49 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: Steven Christey <coley@...us.mitre.org>
Subject: Re: CVE-2008-5621 is a duplicate (was: Re: 
 CVE request:      phpMyAdmin < 3.1.1.0 (SQL injection through XSRF on several
 pages ))


On Thu, 12 Feb 2009, Thijs Kinkhorst wrote:

> I propose that CVE-2008-5622 gets marked as a duplicate of CVE-2008-5621
> or rejected.

Agreed.  CVE-2008-5621 is preserved.

- Steve


======================================================
Name: CVE-2008-5621
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5621
Reference: MILW0RM:7382
Reference: URL:http://www.milw0rm.com/exploits/7382
Reference: CONFIRM:http://www.phpmyadmin.net/home_page/security/PMASA-2008-10.php
Reference: DEBIAN:DSA-1723
Reference: URL:http://www.debian.org/security/2009/dsa-1723
Reference: FEDORA:FEDORA-2008-11221
Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00784.html
Reference: FEDORA:FEDORA-2008-11221
Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00784.html
Reference: SUSE:SUSE-SR:2009:003
Reference: URL:http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
Reference: BID:32720
Reference: URL:http://www.securityfocus.com/bid/32720
Reference: VUPEN:ADV-2008-3402
Reference: URL:http://www.frsirt.com/english/advisories/2008/3402
Reference: SECUNIA:33076
Reference: URL:http://secunia.com/advisories/33076
Reference: SECUNIA:33146
Reference: URL:http://secunia.com/advisories/33146
Reference: SECUNIA:33912
Reference: URL:http://secunia.com/advisories/33912
Reference: SECUNIA:33822
Reference: URL:http://secunia.com/advisories/33822
Reference: SREASON:4753
Reference: URL:http://securityreason.com/securityalert/4753
Reference: XF:phpmyadmin-tblstructure-csrf(47168)
Reference: URL:http://xforce.iss.net/xforce/xfdb/47168

Cross-site request forgery (CSRF) vulnerability in phpMyAdmin 2.11.x
before 2.11.9.4 and 3.x before 3.1.1.0 allows remote attackers to
perform unauthorized actions as the administrator via a link or IMG
tag to tbl_structure.php with a modified table parameter.  NOTE: other
unspecified pages are also reachable, but they have the same root
cause.  NOTE: this can be leveraged to conduct SQL injection attacks
and execute arbitrary code.


======================================================
Name: CVE-2008-5622
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5622

** REJECT **

DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-5621.  Reason:
This candidate is a duplicate of CVE-2008-5621.  Notes: All CVE users
should reference CVE-2008-5621 instead of this candidate.  All
references and descriptions in this candidate have been removed to
prevent accidental usage.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.