CVE-2016-9865

NameCVE-2016-9865
DescriptionAn issue was discovered in phpMyAdmin. Due to a bug in serialized string parsing, it was possible to bypass the protection offered by PMA_safeUnserialize() function. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1415-1, DLA-757-1
NVD severityhigh

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
phpmyadmin (PTS)stretch4:4.6.6-4+deb9u1fixed
stretch (security)4:4.6.6-4+deb9u2fixed
bullseye4:5.0.4+dfsg2-2fixed
bookworm, sid4:5.1.1+dfsg1-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
phpmyadminsourcewheezy4:3.4.11.1-2+deb7u7DLA-757-1
phpmyadminsourcejessie4:4.2.12-2+deb8u3DLA-1415-1
phpmyadminsource(unstable)4:4.6.5.1-1

Notes

https://www.phpmyadmin.net/security/PMASA-2016-70/
https://github.com/phpmyadmin/phpmyadmin/commit/17b34be (RELEASE_4_6_5)
https://github.com/phpmyadmin/phpmyadmin/commit/1fc004d (MAINT_4_4_15)

Search for package or bug name: Reporting problems