Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 25 Sep 2012 10:52:20 -0400 (EDT)
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
Cc: Mitre CVE assign department <cve-assign@...re.org>,
        oss-security@...ts.openwall.com
Subject: CVE Request - phpMyAdmin: PMASA-2012-5 incident

Hello Kurt, Steve, vendors,

  based on:
  [1] http://www.phpmyadmin.net/home_page/security/PMASA-2012-5.php
  [2] http://secunia.com/advisories/50703/

looks (more from [1]): "One server from the SourceForge.net mirror
system was distributing a phpMyAdmin kit containing a backdoor,
allowing remotely to execute arbitrary PHP code."

Could you allocate a CVE id for this? (I think it's appropriate)

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ