phpmyadmin vulnerability

I know there is a probability that this is well known by everyone already... but there is a nasty phpmyadmin bug that allows the user to exploit the php eval() function. Allows them to gain control of your box. I have had several boxes get nailed hard by this one including a vicibox install.
http://poc-hack.blogspot.com/2011/08/ph ... -3431.html
http://poc-hack.blogspot.com/2011/08/ph ... -3431.html