ID ALAS-2012-092 Type amazon Reporter Amazon Modified 2014-09-14T16:22:00
Description
Issue Overview:
A flaw was found in the way MySQL processed HANDLER READ NEXT statements after deleting a record. A remote, authenticated attacker could use this flaw to provide such requests, causing mysqld to crash. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2012-2102 __)
Affected Packages:
mysql51
Issue Correction:
Run yum update mysql51 to update your system.
{"cve": [{"lastseen": "2019-05-29T18:12:22", "bulletinFamily": "NVD", "description": "MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT.", "modified": "2014-02-21T04:50:00", "id": "CVE-2012-2102", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2102", "published": "2012-08-17T00:55:00", "title": "CVE-2012-2102", "type": "cve", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:36:37", "bulletinFamily": "unix", "description": "[5.1.61-4]\n- Add backported patch for CVE-2012-2102\nResolves: #812435\n[5.1.61-3]\n- Enable innodb plugin, but only on x86 and x86_64 architectures\nResolves: #740224", "modified": "2012-06-27T00:00:00", "published": "2012-06-27T00:00:00", "id": "ELSA-2012-0874", "href": "http://linux.oracle.com/errata/ELSA-2012-0874.html", "title": "mysql security and enhancement update", "type": "oraclelinux", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}], "openvas": [{"lastseen": "2018-01-11T11:06:24", "bulletinFamily": "scanner", "description": "Check for the Version of mysql", "modified": "2018-01-10T00:00:00", "published": "2012-06-22T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=870778", "id": "OPENVAS:870778", "title": "RedHat Update for mysql RHSA-2012:0874-04", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for mysql RHSA-2012:0874-04\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. It consists of\n the MySQL server daemon (mysqld) and many client programs and libraries.\n\n A flaw was found in the way MySQL processed HANDLER READ NEXT statements\n after deleting a record. A remote, authenticated attacker could use this\n flaw to provide such requests, causing mysqld to crash. This issue only\n caused a temporary denial of service, as mysqld was automatically restarted\n after the crash. (CVE-2012-2102)\n\n This update also adds the following enhancement:\n\n * The InnoDB storage engine is built-in for all architectures. This update\n adds InnoDB Plugin, the InnoDB storage engine as a plug-in for the 32-bit\n x86, AMD64, and Intel 64 architectures. The plug-in offers additional\n features and better performance than when using the built-in InnoDB storage\n engine. Refer to the MySQL documentation, linked to in the References\n section, for information about enabling the plug-in. (BZ#740224)\n\n All MySQL users should upgrade to these updated packages, which add this\n enhancement and contain a backported patch to correct this issue. After\n installing this update, the MySQL server daemon (mysqld) will be restarted\n automatically.\";\n\ntag_affected = \"mysql on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-June/msg00030.html\");\n script_id(870778);\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_version(\"$Revision: 8352 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-10 08:01:57 +0100 (Wed, 10 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-22 10:26:57 +0530 (Fri, 22 Jun 2012)\");\n script_cve_id(\"CVE-2012-2102\");\n script_xref(name: \"RHSA\", value: \"2012:0874-04\");\n script_name(\"RedHat Update for mysql RHSA-2012:0874-04\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-debuginfo\", rpm:\"mysql-debuginfo~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-libs\", rpm:\"mysql-libs~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 3.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:18", "bulletinFamily": "scanner", "description": "Amazon Linux Local Security Checks", "modified": "2018-10-01T00:00:00", "published": "2015-09-08T00:00:00", "id": "OPENVAS:1361412562310120297", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120297", "title": "Amazon Linux Local Check: ALAS-2012-92", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: alas-2012-92.nasl 6578 2017-07-06 13:44:33Z cfischer$\n#\n# Amazon Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@iki.fi>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://ping-viini.org\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120297\");\n script_version(\"$Revision: 11703 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:23:05 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-01 10:05:31 +0200 (Mon, 01 Oct 2018) $\");\n script_name(\"Amazon Linux Local Check: ALAS-2012-92\");\n script_tag(name:\"insight\", value:\"A flaw was found in the way MySQL processed HANDLER READ NEXT statements after deleting a record. A remote, authenticated attacker could use this flaw to provide such requests, causing mysqld to crash. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2012-2102 )\");\n script_tag(name:\"solution\", value:\"Run yum update mysql51 to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2012-92.html\");\n script_cve_id(\"CVE-2012-2102\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Amazon Linux Local Security Checks\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"AMAZON\")\n{\nif ((res = isrpmvuln(pkg:\"mysql51-server\", rpm:\"mysql51-server~5.1.61~4.54.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif ((res = isrpmvuln(pkg:\"mysql51-embedded-devel\", rpm:\"mysql51-embedded-devel~5.1.61~4.54.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif ((res = isrpmvuln(pkg:\"mysql51-common\", rpm:\"mysql51-common~5.1.61~4.54.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif ((res = isrpmvuln(pkg:\"mysql51-libs\", rpm:\"mysql51-libs~5.1.61~4.54.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif ((res = isrpmvuln(pkg:\"mysql51-test\", rpm:\"mysql51-test~5.1.61~4.54.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif ((res = isrpmvuln(pkg:\"mysql51-devel\", rpm:\"mysql51-devel~5.1.61~4.54.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif ((res = isrpmvuln(pkg:\"mysql51\", rpm:\"mysql51~5.1.61~4.54.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif ((res = isrpmvuln(pkg:\"mysql51-embedded\", rpm:\"mysql51-embedded~5.1.61~4.54.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif ((res = isrpmvuln(pkg:\"mysql51-bench\", rpm:\"mysql51-bench~5.1.61~4.54.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif ((res = isrpmvuln(pkg:\"mysql51-debuginfo\", rpm:\"mysql51-debuginfo~5.1.61~4.54.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:38:47", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-07-30T00:00:00", "id": "OPENVAS:1361412562310881061", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881061", "title": "CentOS Update for mysql CESA-2012:0874 centos6", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for mysql CESA-2012:0874 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-July/018716.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881061\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-07-30 15:59:19 +0530 (Mon, 30 Jul 2012)\");\n script_cve_id(\"CVE-2012-2102\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_xref(name:\"CESA\", value:\"2012:0874\");\n script_name(\"CentOS Update for mysql CESA-2012:0874 centos6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'mysql'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_tag(name:\"affected\", value:\"mysql on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"MySQL is a multi-user, multi-threaded SQL database server. It consists of\n the MySQL server daemon (mysqld) and many client programs and libraries.\n\n A flaw was found in the way MySQL processed HANDLER READ NEXT statements\n after deleting a record. A remote, authenticated attacker could use this\n flaw to provide such requests, causing mysqld to crash. This issue only\n caused a temporary denial of service, as mysqld was automatically restarted\n after the crash. (CVE-2012-2102)\n\n This update also adds the following enhancement:\n\n * The InnoDB storage engine is built-in for all architectures. This update\n adds InnoDB Plugin, the InnoDB storage engine as a plug-in for the 32-bit\n x86, AMD64, and Intel 64 architectures. The plug-in offers additional\n features and better performance than when using the built-in InnoDB storage\n engine. Refer to the MySQL documentation, linked to in the References\n section, for information about enabling the plug-in. (BZ#740224)\n\n All MySQL users should upgrade to these updated packages, which add this\n enhancement and contain a backported patch to correct this issue. After\n installing this update, the MySQL server daemon (mysqld) will be restarted\n automatically.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-embedded\", rpm:\"mysql-embedded~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-embedded-devel\", rpm:\"mysql-embedded-devel~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-libs\", rpm:\"mysql-libs~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:36:45", "bulletinFamily": "scanner", "description": "Oracle Linux Local Security Checks ELSA-2012-0874", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123889", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123889", "title": "Oracle Linux Local Check: ELSA-2012-0874", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2012-0874.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123889\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:09:54 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-0874\");\n script_tag(name:\"insight\", value:\"ELSA-2012-0874 - mysql security and enhancement update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-0874\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-0874.html\");\n script_cve_id(\"CVE-2012-2102\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux6\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.61~4.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.61~4.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.1.61~4.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-embedded\", rpm:\"mysql-embedded~5.1.61~4.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-embedded-devel\", rpm:\"mysql-embedded-devel~5.1.61~4.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-libs\", rpm:\"mysql-libs~5.1.61~4.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.1.61~4.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.1.61~4.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:38:31", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2012-06-22T00:00:00", "id": "OPENVAS:1361412562310870778", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870778", "title": "RedHat Update for mysql RHSA-2012:0874-04", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for mysql RHSA-2012:0874-04\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-June/msg00030.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870778\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-22 10:26:57 +0530 (Fri, 22 Jun 2012)\");\n script_cve_id(\"CVE-2012-2102\");\n script_xref(name:\"RHSA\", value:\"2012:0874-04\");\n script_name(\"RedHat Update for mysql RHSA-2012:0874-04\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'mysql'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n script_tag(name:\"affected\", value:\"mysql on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"MySQL is a multi-user, multi-threaded SQL database server. It consists of\n the MySQL server daemon (mysqld) and many client programs and libraries.\n\n A flaw was found in the way MySQL processed HANDLER READ NEXT statements\n after deleting a record. A remote, authenticated attacker could use this\n flaw to provide such requests, causing mysqld to crash. This issue only\n caused a temporary denial of service, as mysqld was automatically restarted\n after the crash. (CVE-2012-2102)\n\n This update also adds the following enhancement:\n\n * The InnoDB storage engine is built-in for all architectures. This update\n adds InnoDB Plugin, the InnoDB storage engine as a plug-in for the 32-bit\n x86, AMD64, and Intel 64 architectures. The plug-in offers additional\n features and better performance than when using the built-in InnoDB storage\n engine. Refer to the MySQL documentation, linked to in the References\n section, for information about enabling the plug-in. (BZ#740224)\n\n All MySQL users should upgrade to these updated packages, which add this\n enhancement and contain a backported patch to correct this issue. After\n installing this update, the MySQL server daemon (mysqld) will be restarted\n automatically.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-debuginfo\", rpm:\"mysql-debuginfo~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-libs\", rpm:\"mysql-libs~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.1.61~4.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2018-01-06T13:07:38", "bulletinFamily": "scanner", "description": "Check for the Version of mysql", "modified": "2018-01-05T00:00:00", "published": "2012-07-30T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=881061", "id": "OPENVAS:881061", "title": "CentOS Update for mysql CESA-2012:0874 centos6 ", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for mysql CESA-2012:0874 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. It consists of\n the MySQL server daemon (mysqld) and many client programs and libraries.\n\n A flaw was found in the way MySQL processed HANDLER READ NEXT statements\n after deleting a record. A remote, authenticated attacker could use this\n flaw to provide such requests, causing mysqld to crash. This issue only\n caused a temporary denial of service, as mysqld was automatically restarted\n after the crash. (CVE-2012-2102)\n \n This update also adds the following enhancement:\n \n * The InnoDB storage engine is built-in for all architectures. This update\n adds InnoDB Plugin, the InnoDB storage engine as a plug-in for the 32-bit\n x86, AMD64, and Intel 64 architectures. The plug-in offers additional\n features and better performance than when using the built-in InnoDB storage\n engine. Refer to the MySQL documentation, linked to in the References\n section, for information about enabling the plug-in. (BZ#740224)\n \n All MySQL users should upgrade to these updated packages, which add this\n enhancement and contain a backported patch to correct this issue. After\n installing this update, the MySQL server daemon (mysqld) will be restarted\n automatically.\";\n\ntag_affected = \"mysql on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-July/018716.html\");\n script_id(881061);\n script_version(\"$Revision: 8295 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-05 07:29:18 +0100 (Fri, 05 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-07-30 15:59:19 +0530 (Mon, 30 Jul 2012)\");\n script_cve_id(\"CVE-2012-2102\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_xref(name: \"CESA\", value: \"2012:0874\");\n script_name(\"CentOS Update for mysql CESA-2012:0874 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-embedded\", rpm:\"mysql-embedded~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-embedded-devel\", rpm:\"mysql-embedded-devel~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-libs\", rpm:\"mysql-libs~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.1.61~4.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 3.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:36:44", "bulletinFamily": "scanner", "description": "Gentoo Linux Local Security Checks GLSA 201308-06", "modified": "2018-10-26T00:00:00", "published": "2015-09-29T00:00:00", "id": "OPENVAS:1361412562310121014", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121014", "title": "Gentoo Security Advisory GLSA 201308-06", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201308-06.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121014\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:25:42 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201308-06\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in MySQL. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201308-06\");\n script_cve_id(\"CVE-2011-2262\", \"CVE-2012-0075\", \"CVE-2012-0087\", \"CVE-2012-0101\", \"CVE-2012-0102\", \"CVE-2012-0112\", \"CVE-2012-0113\", \"CVE-2012-0114\", \"CVE-2012-0115\", \"CVE-2012-0116\", \"CVE-2012-0117\", \"CVE-2012-0118\", \"CVE-2012-0119\", \"CVE-2012-0120\", \"CVE-2012-0484\", \"CVE-2012-0485\", \"CVE-2012-0486\", \"CVE-2012-0487\", \"CVE-2012-0488\", \"CVE-2012-0489\", \"CVE-2012-0490\", \"CVE-2012-0491\", \"CVE-2012-0492\", \"CVE-2012-0493\", \"CVE-2012-0494\", \"CVE-2012-0495\", \"CVE-2012-0496\", \"CVE-2012-0540\", \"CVE-2012-0553\", \"CVE-2012-0572\", \"CVE-2012-0574\", \"CVE-2012-0578\", \"CVE-2012-0583\", \"CVE-2012-1688\", \"CVE-2012-1689\", \"CVE-2012-1690\", \"CVE-2012-1696\", \"CVE-2012-1697\", \"CVE-2012-1702\", \"CVE-2012-1703\", \"CVE-2012-1705\", \"CVE-2012-1734\", \"CVE-2012-2102\", \"CVE-2012-2122\", \"CVE-2012-2749\", \"CVE-2012-3150\", \"CVE-2012-3158\", \"CVE-2012-3160\", \"CVE-2012-3163\", \"CVE-2012-3166\", \"CVE-2012-3167\", \"CVE-2012-3173\", \"CVE-2012-3177\", \"CVE-2012-3180\", \"CVE-2012-3197\", \"CVE-2012-5060\", \"CVE-2012-5096\", \"CVE-2012-5611\", \"CVE-2012-5612\", \"CVE-2012-5613\", \"CVE-2012-5614\", \"CVE-2012-5615\", \"CVE-2012-5627\", \"CVE-2013-0367\", \"CVE-2013-0368\", \"CVE-2013-0371\", \"CVE-2013-0375\", \"CVE-2013-0383\", \"CVE-2013-0384\", \"CVE-2013-0385\", \"CVE-2013-0386\", \"CVE-2013-0389\", \"CVE-2013-1492\", \"CVE-2013-1502\", \"CVE-2013-1506\", \"CVE-2013-1511\", \"CVE-2013-1512\", \"CVE-2013-1521\", \"CVE-2013-1523\", \"CVE-2013-1526\", \"CVE-2013-1531\", \"CVE-2013-1532\", \"CVE-2013-1544\", \"CVE-2013-1548\", \"CVE-2013-1552\", \"CVE-2013-1555\", \"CVE-2013-1566\", \"CVE-2013-1567\", \"CVE-2013-1570\", \"CVE-2013-1623\", \"CVE-2013-2375\", \"CVE-2013-2376\", \"CVE-2013-2378\", \"CVE-2013-2381\", \"CVE-2013-2389\", \"CVE-2013-2391\", \"CVE-2013-2392\", \"CVE-2013-2395\", \"CVE-2013-3802\", \"CVE-2013-3804\", \"CVE-2013-3808\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201308-06\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"dev-db/mysql\", unaffected: make_list(\"ge 5.1.70\"), vulnerable: make_list(\"lt 5.1.70\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:46:57", "bulletinFamily": "unix", "description": "MySQL is a multi-user, multi-threaded SQL database server. It consists of\nthe MySQL server daemon (mysqld) and many client programs and libraries.\n\nA flaw was found in the way MySQL processed HANDLER READ NEXT statements\nafter deleting a record. A remote, authenticated attacker could use this\nflaw to provide such requests, causing mysqld to crash. This issue only\ncaused a temporary denial of service, as mysqld was automatically restarted\nafter the crash. (CVE-2012-2102)\n\nThis update also adds the following enhancement:\n\n* The InnoDB storage engine is built-in for all architectures. This update\nadds InnoDB Plugin, the InnoDB storage engine as a plug-in for the 32-bit\nx86, AMD64, and Intel 64 architectures. The plug-in offers additional\nfeatures and better performance than when using the built-in InnoDB storage\nengine. Refer to the MySQL documentation, linked to in the References\nsection, for information about enabling the plug-in. (BZ#740224)\n\nAll MySQL users should upgrade to these updated packages, which add this\nenhancement and contain a backported patch to correct this issue. After\ninstalling this update, the MySQL server daemon (mysqld) will be restarted\nautomatically.\n", "modified": "2018-06-06T20:24:09", "published": "2012-06-20T04:00:00", "id": "RHSA-2012:0874", "href": "https://access.redhat.com/errata/RHSA-2012:0874", "type": "redhat", "title": "(RHSA-2012:0874) Low: mysql security and enhancement update", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}], "nessus": [{"lastseen": "2019-11-01T02:15:18", "bulletinFamily": "scanner", "description": "Updated mysql packages that fix one security issue and add one\nenhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nA flaw was found in the way MySQL processed HANDLER READ NEXT\nstatements after deleting a record. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash.\nThis issue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2012-2102)\n\nThis update also adds the following enhancement :\n\n* The InnoDB storage engine is built-in for all architectures. This\nupdate adds InnoDB Plugin, the InnoDB storage engine as a plug-in for\nthe 32-bit x86, AMD64, and Intel 64 architectures. The plug-in offers\nadditional features and better performance than when using the\nbuilt-in InnoDB storage engine. Refer to the MySQL documentation,\nlinked to in the References section, for information about enabling\nthe plug-in. (BZ#740224)\n\nAll MySQL users should upgrade to these updated packages, which add\nthis enhancement and contain a backported patch to correct this issue.\nAfter installing this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.", "modified": "2019-11-02T00:00:00", "id": "CENTOS_RHSA-2012-0874.NASL", "href": "https://www.tenable.com/plugins/nessus/59926", "published": "2012-07-11T00:00:00", "title": "CentOS 6 : mysql (CESA-2012:0874)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:0874 and \n# CentOS Errata and Security Advisory 2012:0874 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(59926);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/10/02 15:30:17\");\n\n script_cve_id(\"CVE-2012-2102\");\n script_bugtraq_id(52931);\n script_xref(name:\"RHSA\", value:\"2012:0874\");\n\n script_name(english:\"CentOS 6 : mysql (CESA-2012:0874)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated mysql packages that fix one security issue and add one\nenhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nA flaw was found in the way MySQL processed HANDLER READ NEXT\nstatements after deleting a record. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash.\nThis issue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2012-2102)\n\nThis update also adds the following enhancement :\n\n* The InnoDB storage engine is built-in for all architectures. This\nupdate adds InnoDB Plugin, the InnoDB storage engine as a plug-in for\nthe 32-bit x86, AMD64, and Intel 64 architectures. The plug-in offers\nadditional features and better performance than when using the\nbuilt-in InnoDB storage engine. Refer to the MySQL documentation,\nlinked to in the References section, for information about enabling\nthe plug-in. (BZ#740224)\n\nAll MySQL users should upgrade to these updated packages, which add\nthis enhancement and contain a backported patch to correct this issue.\nAfter installing this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2012-July/018716.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?da175ecc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mysql packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-embedded-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/08/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/07/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/07/11\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", reference:\"mysql-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"mysql-bench-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"mysql-devel-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"mysql-embedded-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"mysql-embedded-devel-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"mysql-libs-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"mysql-server-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"mysql-test-5.1.61-4.el6\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-devel / mysql-embedded / etc\");\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2019-11-01T03:14:22", "bulletinFamily": "scanner", "description": "From Red Hat Security Advisory 2012:0874 :\n\nUpdated mysql packages that fix one security issue and add one\nenhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nA flaw was found in the way MySQL processed HANDLER READ NEXT\nstatements after deleting a record. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash.\nThis issue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2012-2102)\n\nThis update also adds the following enhancement :\n\n* The InnoDB storage engine is built-in for all architectures. This\nupdate adds InnoDB Plugin, the InnoDB storage engine as a plug-in for\nthe 32-bit x86, AMD64, and Intel 64 architectures. The plug-in offers\nadditional features and better performance than when using the\nbuilt-in InnoDB storage engine. Refer to the MySQL documentation,\nlinked to in the References section, for information about enabling\nthe plug-in. (BZ#740224)\n\nAll MySQL users should upgrade to these updated packages, which add\nthis enhancement and contain a backported patch to correct this issue.\nAfter installing this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.", "modified": "2019-11-02T00:00:00", "id": "ORACLELINUX_ELSA-2012-0874.NASL", "href": "https://www.tenable.com/plugins/nessus/68555", "published": "2013-07-12T00:00:00", "title": "Oracle Linux 6 : mysql (ELSA-2012-0874)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2012:0874 and \n# Oracle Linux Security Advisory ELSA-2012-0874 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(68555);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/09/30 10:58:17\");\n\n script_cve_id(\"CVE-2012-2102\");\n script_bugtraq_id(52931);\n script_xref(name:\"RHSA\", value:\"2012:0874\");\n\n script_name(english:\"Oracle Linux 6 : mysql (ELSA-2012-0874)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2012:0874 :\n\nUpdated mysql packages that fix one security issue and add one\nenhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nA flaw was found in the way MySQL processed HANDLER READ NEXT\nstatements after deleting a record. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash.\nThis issue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2012-2102)\n\nThis update also adds the following enhancement :\n\n* The InnoDB storage engine is built-in for all architectures. This\nupdate adds InnoDB Plugin, the InnoDB storage engine as a plug-in for\nthe 32-bit x86, AMD64, and Intel 64 architectures. The plug-in offers\nadditional features and better performance than when using the\nbuilt-in InnoDB storage engine. Refer to the MySQL documentation,\nlinked to in the References section, for information about enabling\nthe plug-in. (BZ#740224)\n\nAll MySQL users should upgrade to these updated packages, which add\nthis enhancement and contain a backported patch to correct this issue.\nAfter installing this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2012-July/002906.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mysql packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-embedded-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/08/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/07/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL6\", reference:\"mysql-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-bench-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-devel-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-embedded-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-embedded-devel-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-libs-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-server-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-test-5.1.61-4.el6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-devel / mysql-embedded / etc\");\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2019-11-03T12:12:57", "bulletinFamily": "scanner", "description": "MySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nA flaw was found in the way MySQL processed HANDLER READ NEXT\nstatements after deleting a record. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash.\nThis issue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2012-2102)\n\nThis update also adds the following enhancement :\n\n - The InnoDB storage engine is built-in for all\n architectures. This update adds InnoDB Plugin, the\n InnoDB storage engine as a plug-in for the 32-bit x86,\n AMD64, and Intel 64 architectures. The plug-in offers\n additional features and better performance than when\n using the built-in InnoDB storage engine. Refer to the\n MySQL documentation, linked to in the References\n section, for information about enabling the plug-in.\n\nAll MySQL users should upgrade to these updated packages, which add\nthis enhancement and contain a backported patch to correct this issue.\nAfter installing this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.", "modified": "2019-11-02T00:00:00", "id": "SL_20120620_MYSQL_ON_SL6_X.NASL", "href": "https://www.tenable.com/plugins/nessus/61341", "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : mysql on SL6.x i386/x86_64", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(61341);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2018/12/31 11:35:01\");\n\n script_cve_id(\"CVE-2012-2102\");\n\n script_name(english:\"Scientific Linux Security Update : mysql on SL6.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"MySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nA flaw was found in the way MySQL processed HANDLER READ NEXT\nstatements after deleting a record. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash.\nThis issue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2012-2102)\n\nThis update also adds the following enhancement :\n\n - The InnoDB storage engine is built-in for all\n architectures. This update adds InnoDB Plugin, the\n InnoDB storage engine as a plug-in for the 32-bit x86,\n AMD64, and Intel 64 architectures. The plug-in offers\n additional features and better performance than when\n using the built-in InnoDB storage engine. Refer to the\n MySQL documentation, linked to in the References\n section, for information about enabling the plug-in.\n\nAll MySQL users should upgrade to these updated packages, which add\nthis enhancement and contain a backported patch to correct this issue.\nAfter installing this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1207&L=scientific-linux-errata&T=0&P=2810\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9ba82b81\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/06/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL6\", reference:\"mysql-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-bench-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-debuginfo-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-devel-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-embedded-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-embedded-devel-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-libs-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-server-5.1.61-4.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-test-5.1.61-4.el6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2019-11-01T02:13:53", "bulletinFamily": "scanner", "description": "A flaw was found in the way MySQL processed HANDLER READ NEXT\nstatements after deleting a record. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash.\nThis issue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2012-2102)", "modified": "2019-11-02T00:00:00", "id": "ALA_ALAS-2012-92.NASL", "href": "https://www.tenable.com/plugins/nessus/69699", "published": "2013-09-04T00:00:00", "title": "Amazon Linux AMI : mysql51 (ALAS-2012-92)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2012-92.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69699);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2018/04/18 15:09:34\");\n\n script_cve_id(\"CVE-2012-2102\");\n script_xref(name:\"ALAS\", value:\"2012-92\");\n script_xref(name:\"RHSA\", value:\"2012:0874\");\n\n script_name(english:\"Amazon Linux AMI : mysql51 (ALAS-2012-92)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was found in the way MySQL processed HANDLER READ NEXT\nstatements after deleting a record. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash.\nThis issue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2012-2102)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2012-92.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update mysql51' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mysql51\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mysql51-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mysql51-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mysql51-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mysql51-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mysql51-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mysql51-embedded-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mysql51-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mysql51-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mysql51-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/07/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/09/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"mysql51-5.1.61-4.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mysql51-bench-5.1.61-4.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mysql51-common-5.1.61-4.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mysql51-debuginfo-5.1.61-4.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mysql51-devel-5.1.61-4.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mysql51-embedded-5.1.61-4.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mysql51-embedded-devel-5.1.61-4.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mysql51-libs-5.1.61-4.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mysql51-server-5.1.61-4.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mysql51-test-5.1.61-4.54.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql51 / mysql51-bench / mysql51-common / mysql51-debuginfo / etc\");\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2019-11-01T03:20:36", "bulletinFamily": "scanner", "description": "Updated mysql packages that fix one security issue and add one\nenhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nA flaw was found in the way MySQL processed HANDLER READ NEXT\nstatements after deleting a record. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash.\nThis issue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2012-2102)\n\nThis update also adds the following enhancement :\n\n* The InnoDB storage engine is built-in for all architectures. This\nupdate adds InnoDB Plugin, the InnoDB storage engine as a plug-in for\nthe 32-bit x86, AMD64, and Intel 64 architectures. The plug-in offers\nadditional features and better performance than when using the\nbuilt-in InnoDB storage engine. Refer to the MySQL documentation,\nlinked to in the References section, for information about enabling\nthe plug-in. (BZ#740224)\n\nAll MySQL users should upgrade to these updated packages, which add\nthis enhancement and contain a backported patch to correct this issue.\nAfter installing this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.", "modified": "2019-11-02T00:00:00", "id": "REDHAT-RHSA-2012-0874.NASL", "href": "https://www.tenable.com/plugins/nessus/59591", "published": "2012-06-20T00:00:00", "title": "RHEL 6 : mysql (RHSA-2012:0874)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:0874. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(59591);\n script_version (\"1.18\");\n script_cvs_date(\"Date: 2019/10/24 15:35:35\");\n\n script_cve_id(\"CVE-2012-2102\");\n script_bugtraq_id(52931);\n script_xref(name:\"RHSA\", value:\"2012:0874\");\n\n script_name(english:\"RHEL 6 : mysql (RHSA-2012:0874)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated mysql packages that fix one security issue and add one\nenhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nA flaw was found in the way MySQL processed HANDLER READ NEXT\nstatements after deleting a record. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash.\nThis issue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2012-2102)\n\nThis update also adds the following enhancement :\n\n* The InnoDB storage engine is built-in for all architectures. This\nupdate adds InnoDB Plugin, the InnoDB storage engine as a plug-in for\nthe 32-bit x86, AMD64, and Intel 64 architectures. The plug-in offers\nadditional features and better performance than when using the\nbuilt-in InnoDB storage engine. Refer to the MySQL documentation,\nlinked to in the References section, for information about enabling\nthe plug-in. (BZ#740224)\n\nAll MySQL users should upgrade to these updated packages, which add\nthis enhancement and contain a backported patch to correct this issue.\nAfter installing this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n # http://dev.mysql.com/doc/refman/5.1/en/replacing-builtin-innodb.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://dev.mysql.com/doc/refman/5.1/en/replacing-builtin-innodb.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2012:0874\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-2102\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-embedded-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/08/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/06/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/06/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2012:0874\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"mysql-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"mysql-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"mysql-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"mysql-bench-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"mysql-bench-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"mysql-bench-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"mysql-debuginfo-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"mysql-devel-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"mysql-embedded-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"mysql-embedded-devel-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"mysql-libs-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"mysql-server-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"mysql-server-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"mysql-server-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"mysql-test-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"mysql-test-5.1.61-4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"mysql-test-5.1.61-4.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-debuginfo / mysql-devel / etc\");\n }\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2019-11-01T02:57:22", "bulletinFamily": "scanner", "description": "The version of MySQL 5.1 installed on the remote host is earlier\nthan 5.1.62. It is, therefore, affected by the following\nvulnerabilities :\n\n - An error exists related to the included yaSSL\n component that could allow arbitrary code execution.\n (CVE-2012-0882)\n\n - Errors exist related to ", "modified": "2019-11-02T00:00:00", "id": "MYSQL_5_1_62.NASL", "href": "https://www.tenable.com/plugins/nessus/58802", "published": "2012-04-19T00:00:00", "title": "MySQL 5.1 < 5.1.62 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(58802);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2018/11/15 20:50:21\");\n script_cve_id(\n \"CVE-2012-0882\",\n \"CVE-2012-1688\",\n \"CVE-2012-1690\",\n \"CVE-2012-1703\",\n \"CVE-2012-2102\"\n );\n script_bugtraq_id(51925, 52931, 53058, 53067, 53074);\n\n script_name(english:\"MySQL 5.1 < 5.1.62 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of MySQL server\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote database server is affected by multiple vulnerabilities.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The version of MySQL 5.1 installed on the remote host is earlier\nthan 5.1.62. It is, therefore, affected by the following\nvulnerabilities :\n\n - An error exists related to the included yaSSL\n component that could allow arbitrary code execution.\n (CVE-2012-0882)\n\n - Errors exist related to 'Server Optimizer',\n 'Server DML', 'Partition' and, in combination with\n InnoDB, 'HANDLER READ NEXT' that could allow denial of\n service attacks. (CVE-2012-1688, CVE-2012-1690,\n CVE-2012-1703, CVE-2012-2102)\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html\");\n # https://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4225df87\");\n script_set_attribute(attribute:\"see_also\", value:\"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html\");\n # https://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4225df87\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.openwall.com/lists/oss-security/2012/02/24/2\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to MySQL version 5.1.62 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/04/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/03/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/04/19\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mysql:mysql\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Databases\");\n\n script_copyright(english:\"This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mysql_version.nasl\", \"mysql_login.nasl\");\n script_require_keys(\"Settings/ParanoidReport\");\n script_require_ports(\"Services/mysql\", 3306);\n\n exit(0);\n}\n\ninclude(\"mysql_version.inc\");\n\nmysql_check_version(fixed:'5.1.62', min:'5.1', severity:SECURITY_WARNING);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-11-01T02:57:23", "bulletinFamily": "scanner", "description": "The version of MySQL 5.5 installed on the remote host is earlier than\n5.5.22. It is, therefore, affected by the following vulnerabilities :\n\n - An error exists related to the included yaSSL\n component that could allow arbitrary code execution.\n (CVE-2012-0882)\n\n - Errors exist related to ", "modified": "2019-11-02T00:00:00", "id": "MYSQL_5_5_22.NASL", "href": "https://www.tenable.com/plugins/nessus/58661", "published": "2012-04-11T00:00:00", "title": "MySQL 5.5 < 5.5.22 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(58661);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2018/11/15 20:50:21\");\n script_cve_id(\n \"CVE-2012-0882\",\n \"CVE-2012-1688\",\n \"CVE-2012-1690\",\n \"CVE-2012-1697\",\n \"CVE-2012-1703\",\n \"CVE-2012-2102\"\n );\n script_bugtraq_id(51925, 52931, 53058, 53064, 53067, 53074);\n\n script_name(english:\"MySQL 5.5 < 5.5.22 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of MySQL server\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote database server is affected by multiple vulnerabilities.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The version of MySQL 5.5 installed on the remote host is earlier than\n5.5.22. It is, therefore, affected by the following vulnerabilities :\n\n - An error exists related to the included yaSSL\n component that could allow arbitrary code execution.\n (CVE-2012-0882)\n\n - Errors exist related to 'Server Optimizer',\n 'Server DML', 'Partition' and, in combination with\n InnoDB, 'HANDLER READ NEXT' that could allow denial of\n service attacks. (CVE-2012-1688, CVE-2012-1690,\n CVE-2012-1697, CVE-2012-1703, CVE-2012-2102)\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html\");\n # https://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4225df87\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.openwall.com/lists/oss-security/2012/02/24/2\");\n script_set_attribute(\n attribute:\"solution\",\n value:\"Upgrade to MySQL version 5.5.22 or later.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/03/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/03/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/04/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mysql:mysql\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Databases\");\n\n script_copyright(english:\"This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mysql_version.nasl\", \"mysql_login.nasl\");\n script_require_keys(\"Settings/ParanoidReport\");\n script_require_ports(\"Services/mysql\", 3306);\n\n exit(0);\n}\n\ninclude(\"mysql_version.inc\");\n\nmysql_check_version(fixed:'5.5.22', min:'5.5', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-11-01T02:21:12", "bulletinFamily": "scanner", "description": "Due to the non-disclosure of security patch information from\n Oracle, we are forced to ship an upstream version update of MySQL\n 5.1. There are several known incompatible changes, which are\n listed in /usr/share/doc/mysql-server/NEWS.Debian.gz.\n\nSeveral issues have been discovered in the MySQL database server. The\nvulnerabilities are addressed by upgrading MySQL to a new upstream\nversion, 5.1.63, which includes additional changes, such as\nperformance improvements and corrections for data loss defects. These\nchanges are described in the MySQL release notes.\n\n CVE-2012-2122, an authentication bypass vulnerability, occurs only\n when MySQL has been built in with certain optimisations enabled. The\n packages in Debian stable (squeeze) are not known to be affected by\n this vulnerability. It is addressed in this update nonetheless, so\n future rebuilds will not become vulnerable to this issue.", "modified": "2019-11-02T00:00:00", "id": "DEBIAN_DSA-2496.NASL", "href": "https://www.tenable.com/plugins/nessus/59774", "published": "2012-06-29T00:00:00", "title": "Debian DSA-2496-1 : mysql-5.1 - several vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2496. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(59774);\n script_version(\"1.18\");\n script_cvs_date(\"Date: 2018/11/19 11:02:41\");\n\n script_cve_id(\"CVE-2012-0540\", \"CVE-2012-0583\", \"CVE-2012-1688\", \"CVE-2012-1689\", \"CVE-2012-1690\", \"CVE-2012-1703\", \"CVE-2012-1734\", \"CVE-2012-2102\", \"CVE-2012-2122\", \"CVE-2012-2749\");\n script_bugtraq_id(53058, 53061, 53067, 53074, 53911);\n script_xref(name:\"DSA\", value:\"2496\");\n\n script_name(english:\"Debian DSA-2496-1 : mysql-5.1 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Due to the non-disclosure of security patch information from\n Oracle, we are forced to ship an upstream version update of MySQL\n 5.1. There are several known incompatible changes, which are\n listed in /usr/share/doc/mysql-server/NEWS.Debian.gz.\n\nSeveral issues have been discovered in the MySQL database server. The\nvulnerabilities are addressed by upgrading MySQL to a new upstream\nversion, 5.1.63, which includes additional changes, such as\nperformance improvements and corrections for data loss defects. These\nchanges are described in the MySQL release notes.\n\n CVE-2012-2122, an authentication bypass vulnerability, occurs only\n when MySQL has been built in with certain optimisations enabled. The\n packages in Debian stable (squeeze) are not known to be affected by\n this vulnerability. It is addressed in this update nonetheless, so\n future rebuilds will not become vulnerable to this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670636\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677018\"\n );\n # http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2012-2122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/squeeze/mysql-5.1\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2012/dsa-2496\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the MySQL packages.\n\nFor the stable distribution (squeeze), these problems have been fixed\nin version 5.1.63-0+squeeze1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:mysql-5.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:6.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/06/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/06/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"6.0\", prefix:\"libmysqlclient-dev\", reference:\"5.1.63-0+squeeze1\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"libmysqlclient16\", reference:\"5.1.63-0+squeeze1\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"libmysqld-dev\", reference:\"5.1.63-0+squeeze1\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"libmysqld-pic\", reference:\"5.1.63-0+squeeze1\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"mysql-client\", reference:\"5.1.63-0+squeeze1\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"mysql-client-5.1\", reference:\"5.1.63-0+squeeze1\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"mysql-common\", reference:\"5.1.63-0+squeeze1\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"mysql-server\", reference:\"5.1.63-0+squeeze1\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"mysql-server-5.1\", reference:\"5.1.63-0+squeeze1\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"mysql-server-core-5.1\", reference:\"5.1.63-0+squeeze1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2019-11-01T02:40:27", "bulletinFamily": "scanner", "description": "The remote host is affected by the vulnerability described in GLSA-201308-06\n(MySQL: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in MySQL. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could send a specially crafted request, possibly\n resulting in execution of arbitrary code with the privileges of the\n application or a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.", "modified": "2019-11-02T00:00:00", "id": "GENTOO_GLSA-201308-06.NASL", "href": "https://www.tenable.com/plugins/nessus/69508", "published": "2013-08-30T00:00:00", "title": "GLSA-201308-06 : MySQL: Multiple vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201308-06.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69508);\n script_version(\"1.12\");\n script_cvs_date(\"Date: 2018/07/11 17:09:26\");\n\n script_cve_id(\"CVE-2011-2262\", \"CVE-2012-0075\", \"CVE-2012-0087\", \"CVE-2012-0101\", \"CVE-2012-0102\", \"CVE-2012-0112\", \"CVE-2012-0113\", \"CVE-2012-0114\", \"CVE-2012-0115\", \"CVE-2012-0116\", \"CVE-2012-0117\", \"CVE-2012-0118\", \"CVE-2012-0119\", \"CVE-2012-0120\", \"CVE-2012-0484\", \"CVE-2012-0485\", \"CVE-2012-0486\", \"CVE-2012-0487\", \"CVE-2012-0488\", \"CVE-2012-0489\", \"CVE-2012-0490\", \"CVE-2012-0491\", \"CVE-2012-0492\", \"CVE-2012-0493\", \"CVE-2012-0494\", \"CVE-2012-0495\", \"CVE-2012-0496\", \"CVE-2012-0540\", \"CVE-2012-0553\", \"CVE-2012-0572\", \"CVE-2012-0574\", \"CVE-2012-0578\", \"CVE-2012-0583\", \"CVE-2012-1688\", \"CVE-2012-1689\", \"CVE-2012-1690\", \"CVE-2012-1696\", \"CVE-2012-1697\", \"CVE-2012-1702\", \"CVE-2012-1703\", \"CVE-2012-1705\", \"CVE-2012-1734\", \"CVE-2012-2102\", \"CVE-2012-2122\", \"CVE-2012-2749\", \"CVE-2012-3150\", \"CVE-2012-3158\", \"CVE-2012-3160\", \"CVE-2012-3163\", \"CVE-2012-3166\", \"CVE-2012-3167\", \"CVE-2012-3173\", \"CVE-2012-3177\", \"CVE-2012-3180\", \"CVE-2012-3197\", \"CVE-2012-5060\", \"CVE-2012-5096\", \"CVE-2012-5611\", \"CVE-2012-5612\", \"CVE-2012-5613\", \"CVE-2012-5614\", \"CVE-2012-5615\", \"CVE-2012-5627\", \"CVE-2013-0367\", \"CVE-2013-0368\", \"CVE-2013-0371\", \"CVE-2013-0375\", \"CVE-2013-0383\", \"CVE-2013-0384\", \"CVE-2013-0385\", \"CVE-2013-0386\", \"CVE-2013-0389\", \"CVE-2013-1492\", \"CVE-2013-1502\", \"CVE-2013-1506\", \"CVE-2013-1511\", \"CVE-2013-1512\", \"CVE-2013-1521\", \"CVE-2013-1523\", \"CVE-2013-1526\", \"CVE-2013-1531\", \"CVE-2013-1532\", \"CVE-2013-1544\", \"CVE-2013-1548\", \"CVE-2013-1552\", \"CVE-2013-1555\", \"CVE-2013-1566\", \"CVE-2013-1567\", \"CVE-2013-1570\", \"CVE-2013-1623\", \"CVE-2013-2375\", \"CVE-2013-2376\", \"CVE-2013-2378\", \"CVE-2013-2381\", \"CVE-2013-2389\", \"CVE-2013-2391\", \"CVE-2013-2392\", \"CVE-2013-2395\", \"CVE-2013-3802\", \"CVE-2013-3804\", \"CVE-2013-3808\");\n script_bugtraq_id(51271, 51488, 51493, 51502, 51503, 51504, 51505, 51506, 51507, 51508, 51509, 51510, 51511, 51512, 51513, 51514, 51515, 51516, 51517, 51518, 51519, 51520, 51521, 51522, 51523, 51524, 51525, 51526, 52931, 53058, 53061, 53064, 53067, 53071, 53074, 53911, 54540, 54547, 54551, 55120, 55990, 56003, 56005, 56017, 56018, 56021, 56027, 56028, 56036, 56041, 56766, 56768, 56769, 56771, 56776, 56837, 57334, 57385, 57388, 57391, 57397, 57400, 57405, 57408, 57410, 57411, 57412, 57414, 57415, 57416, 57417, 57418, 57780, 58594, 58595, 59173, 59180, 59188, 59196, 59201, 59202, 59205, 59207, 59209, 59210, 59211, 59215, 59216, 59217, 59218, 59223, 59224, 59225, 59227, 59229, 59232, 59237, 59239, 59242, 61227, 61244, 61260);\n script_xref(name:\"GLSA\", value:\"201308-06\");\n\n script_name(english:\"GLSA-201308-06 : MySQL: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201308-06\n(MySQL: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in MySQL. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could send a specially crafted request, possibly\n resulting in execution of arbitrary code with the privileges of the\n application or a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201308-06\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All MySQL users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-db/mysql-5.1.70'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Oracle MySQL for Microsoft Windows FILE Privilege Abuse');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/08/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/08/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"dev-db/mysql\", unaffected:make_list(\"ge 5.1.70\"), vulnerable:make_list(\"lt 5.1.70\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MySQL\");\n}\n", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2019-05-29T18:35:43", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2012:0874\n\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists of\nthe MySQL server daemon (mysqld) and many client programs and libraries.\n\nA flaw was found in the way MySQL processed HANDLER READ NEXT statements\nafter deleting a record. A remote, authenticated attacker could use this\nflaw to provide such requests, causing mysqld to crash. This issue only\ncaused a temporary denial of service, as mysqld was automatically restarted\nafter the crash. (CVE-2012-2102)\n\nThis update also adds the following enhancement:\n\n* The InnoDB storage engine is built-in for all architectures. This update\nadds InnoDB Plugin, the InnoDB storage engine as a plug-in for the 32-bit\nx86, AMD64, and Intel 64 architectures. The plug-in offers additional\nfeatures and better performance than when using the built-in InnoDB storage\nengine. Refer to the MySQL documentation, linked to in the References\nsection, for information about enabling the plug-in. (BZ#740224)\n\nAll MySQL users should upgrade to these updated packages, which add this\nenhancement and contain a backported patch to correct this issue. After\ninstalling this update, the MySQL server daemon (mysqld) will be restarted\nautomatically.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2012-July/018716.html\n\n**Affected packages:**\nmysql\nmysql-bench\nmysql-devel\nmysql-embedded\nmysql-embedded-devel\nmysql-libs\nmysql-server\nmysql-test\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2012-0874.html", "modified": "2012-07-10T13:24:18", "published": "2012-07-10T13:24:18", "href": "http://lists.centos.org/pipermail/centos-announce/2012-July/018716.html", "id": "CESA-2012:0874", "title": "mysql security update", "type": "centos", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:33", "bulletinFamily": "unix", "description": "### Background\n\nMySQL is a fast, multi-threaded, multi-user SQL database server.\n\n### Description\n\nMultiple vulnerabilities have been discovered in MySQL. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could send a specially crafted request, possibly resulting in execution of arbitrary code with the privileges of the application or a Denial of Service condition. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll MySQL users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-db/mysql-5.1.70\"", "modified": "2013-08-30T00:00:00", "published": "2013-08-29T00:00:00", "id": "GLSA-201308-06", "href": "https://security.gentoo.org/glsa/201308-06", "type": "gentoo", "title": "MySQL: Multiple vulnerabilities", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}