Lucene search

K

Fedora 10 : mysql-5.0.88-1.fc10 (2009-12180)

πŸ—“οΈΒ 14 Dec 2009Β 00:00:00Reported byΒ This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.TypeΒ 
nessus
Β nessus
πŸ”—Β www.tenable.comπŸ‘Β 28Β Views

The remote Fedora host is missing a security update for mysql-5.0.88-1.fc10 (2009-12180). See details at https://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.htm

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Exploit DB
MySQL 6.0.9 - SELECT Statement WHERE Clause Sub-query Denial of Service
23 Nov 200900:00
–exploitdb
Exploit DB
MySQL 6.0.9 - 'GeomFromWKB()' Function First Argument Geometry Value Handling Denial of Service
23 Nov 200900:00
–exploitdb
NVD
CVE-2009-4019
30 Nov 200917:30
–nvd
Prion
Code injection
30 Nov 200917:30
–prion
seebug.org
MySQL倚δΈͺη•Έε½’SQLζ“δ½œε€„η†ζ‹’η»ζœεŠ‘ζΌζ΄ž
17 Dec 200900:00
–seebug
seebug.org
MySQL SELECTθ―­ε₯ε€„η†ζ‹’η»ζœεŠ‘ζΌζ΄ž
2 Dec 200900:00
–seebug
seebug.org
MySQL vulnerabilities
13 Feb 201000:00
–seebug
Cvelist
CVE-2009-4019
30 Nov 200917:00
–cvelist
UbuntuCve
CVE-2009-4019
30 Nov 200900:00
–ubuntucve
Veracode
Denial Of Service (DoS)
10 Apr 202000:43
–veracode
Rows per page
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Fedora Security Advisory 2009-12180.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(43113);
  script_version("1.14");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");

  script_cve_id("CVE-2009-4019");
  script_bugtraq_id(35609);
  script_xref(name:"FEDORA", value:"2009-12180");

  script_name(english:"Fedora 10 : mysql-5.0.88-1.fc10 (2009-12180)");
  script_summary(english:"Checks rpm output for the updated package.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Fedora host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"See http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
  );
  # http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html
  script_set_attribute(
    attribute:"see_also",
    value:"https://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=540906"
  );
  # https://lists.fedoraproject.org/pipermail/package-announce/2009-December/032573.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?cccd0fa0"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected mysql package.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:ND");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mysql");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:10");

  script_set_attribute(attribute:"patch_publication_date", value:"2009/11/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2009/12/14");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Fedora Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^10([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 10.x", "Fedora " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);

flag = 0;
if (rpm_check(release:"FC10", reference:"mysql-5.0.88-1.fc10")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mysql");
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
14 Dec 2009 00:00Current
9.6High risk
Vulners AI Score9.6
CVSS24
EPSS0.1
28
.json
Report