Lucene search

K
nessusThis script is Copyright (C) 2006-2021 Tenable Network Security, Inc.GENTOO_GLSA-200605-13.NASL
HistoryMay 13, 2006 - 12:00 a.m.

GLSA-200605-13 : MySQL: Information leakage

2006-05-1300:00:00
This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.
www.tenable.com
12

The remote host is affected by the vulnerability described in GLSA-200605-13 (MySQL: Information leakage)

The processing of the COM_TABLE_DUMP command by a MySQL server fails to     properly validate packets that arrive from the client via a network     socket.

Impact :

By crafting specific malicious packets an attacker could gather     confidential information from the memory of a MySQL server process, for     example results of queries by other users or applications. By using PHP     code injection or similar techniques it would be possible to exploit     this flaw through web applications that use MySQL as a database     backend.
Note that on 5.x versions it is possible to overwrite the stack and     execute arbitrary code with this technique. Users of MySQL 5.x are     urged to upgrade to the latest available version.

Workaround :

There is no known workaround at this time.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200605-13.
#
# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(21355);
  script_version("1.17");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");

  script_cve_id("CVE-2006-1516", "CVE-2006-1517");
  script_bugtraq_id(17780);
  script_xref(name:"GLSA", value:"200605-13");

  script_name(english:"GLSA-200605-13 : MySQL: Information leakage");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200605-13
(MySQL: Information leakage)

    The processing of the COM_TABLE_DUMP command by a MySQL server fails to
    properly validate packets that arrive from the client via a network
    socket.
  
Impact :

    By crafting specific malicious packets an attacker could gather
    confidential information from the memory of a MySQL server process, for
    example results of queries by other users or applications. By using PHP
    code injection or similar techniques it would be possible to exploit
    this flaw through web applications that use MySQL as a database
    backend.
    Note that on 5.x versions it is possible to overwrite the stack and
    execute arbitrary code with this technique. Users of MySQL 5.x are
    urged to upgrade to the latest available version.
  
Workaround :

    There is no known workaround at this time."
  );
  # http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2006-05/msg00041.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?0c8bb2e4"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200605-13"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All MySQL users should upgrade to the latest version.
    # emerge --sync
    # emerge --ask --oneshot --verbose '>=dev-db/mysql-4.0.27'"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:mysql");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2006/05/11");
  script_set_attribute(attribute:"plugin_publication_date", value:"2006/05/13");
  script_set_attribute(attribute:"vuln_publication_date", value:"2006/05/02");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"dev-db/mysql", unaffected:make_list("ge 4.1.19", "rge 4.0.27"), vulnerable:make_list("lt 4.1.19"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "MySQL");
}
VendorProductVersionCPE
gentoolinuxmysqlp-cpe:/a:gentoo:linux:mysql
gentoolinuxcpe:/o:gentoo:linux