Hello,

I have been looking into PMASA-2016-60 for phpmyadmin, and nothing seems
to be certain.

* There does appear to be security issues with old versions of PHP with
  certain functions when passing strings with embedded
  nulls. http://www.madirish.net/401

* However as far as I can tell, php in wheezy is not vulnerable.

* Furthermore, these vulnerabilities are suppose to apply when
  processing the username. I am having trouble trying to visualize how
  an embedded null in the username could result in bypassing access
  control lists. Or how a username with an embedded null could get
  authenticated even.

* Looking at the code I don't see any of the vulnerable functions
  touching username.

* The fix looks easy; however don't like to apply the fix unless I can
  say for certain that it does something useful. Which means I need an
  exploit. I can't find enough details for this.

Any ideas?

Ok, so I have had one more idea since typing this out. Possibly the
problem is that the user is connecting as something like
"root\0fudge". This results in the user connecting to mysql as "root" -
assuming the mysql functions have this vulnerability" but we think the
user is connecting as "root\0fudge" so the don't apply the rules for
"root".

Out of time now, will need to consider this more.
-- 
Brian May <b...@debian.org>

Reply via email to