http://bugzilla.suse.com/show_bug.cgi?id=994313
http://bugzilla.suse.com/show_bug.cgi?id=994313#c28
--- Comment #28 from Marcus Meissner ---
https://www.phpmyadmin.net/security/PMASA-2016-29/
PMASA-2016-29
Announcement-ID: PMASA-2016-29
Date: 2016-07-07
Summary
Weakness with cookie encryption
Description
A pair of vulnerabilities were found affecting the way cookies are stored.
The decryption of the username/password is vulnerable to a padding oracle
attack. The can allow an attacker who has access to a user's browser cookie
file to decrypt the username and password.
A vulnerability was found where the same initialization vector (IV) is used
to hash the username and password stored in the phpMyAdmin cookie. If a user
has the same password as their username, an attacker who examines the browser
cookie can see that they are the same — but the attacker can not directly
decode these values from the cookie as it is still hashed.
Severity
We consider this to be critical.
Affected Versions
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and
4.0.x versions (prior to 4.0.10.17) are affected
Solution
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply patch
listed below.
References
Thanks to Emanuel Bronshtein @e3amn2l for reporting this vulnerability.
Assigned CVE ids: CVE-2016-6606
CWE ids: CWE-661
Patches
The following commits have been made on the 4.6 branch to fix this issue:
a97be3a
The following commits have been made on the 4.4 branch to fix this issue:
cd682a6
The following commits have been made on the 4.0 branch to fix this issue:
95b7b7d
--
You are receiving this mail because:
You are on the CC list for the bug.