7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.969 High
EPSS
Percentile
99.7%
A number of vulnerabilities were discovered by Stefano Di Paola in the MySQL server :
If an authenticated user had INSERT privileges on the ‘mysql’ database, the CREATE FUNCTION command allowed that user to use libc functions to execute arbitrary code with the privileges of the user running the database server (mysql) (CVE-2005-0709).
If an authenticated user had INSERT privileges on the ‘mysql’ database, it was possible to load a library located in an arbitrary directory by using INSERT INTO mysql.func instead of CREATE FUNCTION.
This also would allow the user to execute arbitrary code with the privileges of the user running the database server (CVE-2005-0710).
Finally, temporary files belonging to tables created with CREATE TEMPORARY TABLE were handled in an insecure manner, allowing any local user to overwrite arbitrary files with the privileges of the database server (CVE-2005-0711).
The updated packages have been patched to correct these issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Mandrake Linux Security Advisory MDKSA-2005:060.
# The text itself is copyright (C) Mandriva S.A.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(17601);
script_version("1.18");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2001-0775", "CVE-2005-0638", "CVE-2005-0639", "CVE-2005-0709", "CVE-2005-0710", "CVE-2005-0711");
script_xref(name:"MDKSA", value:"2005:060");
script_name(english:"Mandrake Linux Security Advisory : MySQL (MDKSA-2005:060)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Mandrake Linux host is missing one or more security
updates."
);
script_set_attribute(
attribute:"description",
value:
"A number of vulnerabilities were discovered by Stefano Di Paola in the
MySQL server :
If an authenticated user had INSERT privileges on the 'mysql'
database, the CREATE FUNCTION command allowed that user to use libc
functions to execute arbitrary code with the privileges of the user
running the database server (mysql) (CVE-2005-0709).
If an authenticated user had INSERT privileges on the 'mysql'
database, it was possible to load a library located in an arbitrary
directory by using INSERT INTO mysql.func instead of CREATE FUNCTION.
This also would allow the user to execute arbitrary code with the
privileges of the user running the database server (CVE-2005-0710).
Finally, temporary files belonging to tables created with CREATE
TEMPORARY TABLE were handled in an insecure manner, allowing any local
user to overwrite arbitrary files with the privileges of the database
server (CVE-2005-0711).
The updated packages have been patched to correct these issues."
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:MySQL");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:MySQL-Max");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:MySQL-bench");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:MySQL-client");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:MySQL-common");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64mysql12");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64mysql12-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libmysql12");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libmysql12-devel");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:10.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:10.1");
script_set_attribute(attribute:"patch_publication_date", value:"2005/03/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2005/03/23");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
script_family(english:"Mandriva Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
flag = 0;
if (rpm_check(release:"MDK10.0", reference:"MySQL-4.0.18-1.4.100mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.0", reference:"MySQL-Max-4.0.18-1.4.100mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.0", reference:"MySQL-bench-4.0.18-1.4.100mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.0", reference:"MySQL-client-4.0.18-1.4.100mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.0", reference:"MySQL-common-4.0.18-1.4.100mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.0", cpu:"amd64", reference:"lib64mysql12-4.0.18-1.4.100mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.0", cpu:"amd64", reference:"lib64mysql12-devel-4.0.18-1.4.100mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.0", cpu:"i386", reference:"libmysql12-4.0.18-1.4.100mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.0", cpu:"i386", reference:"libmysql12-devel-4.0.18-1.4.100mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.1", reference:"MySQL-4.0.20-3.3.101mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.1", reference:"MySQL-Max-4.0.20-3.3.101mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.1", reference:"MySQL-bench-4.0.20-3.3.101mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.1", reference:"MySQL-client-4.0.20-3.3.101mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.1", reference:"MySQL-common-4.0.20-3.3.101mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.1", cpu:"x86_64", reference:"lib64mysql12-4.0.20-3.3.101mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.1", cpu:"x86_64", reference:"lib64mysql12-devel-4.0.20-3.3.101mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.1", cpu:"i386", reference:"libmysql12-4.0.20-3.3.101mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK10.1", cpu:"i386", reference:"libmysql12-devel-4.0.20-3.3.101mdk", yank:"mdk")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
mandriva | linux | mysql | p-cpe:/a:mandriva:linux:mysql |
mandriva | linux | mysql-max | p-cpe:/a:mandriva:linux:mysql-max |
mandriva | linux | mysql-bench | p-cpe:/a:mandriva:linux:mysql-bench |
mandriva | linux | mysql-client | p-cpe:/a:mandriva:linux:mysql-client |
mandriva | linux | mysql-common | p-cpe:/a:mandriva:linux:mysql-common |
mandriva | linux | lib64mysql12 | p-cpe:/a:mandriva:linux:lib64mysql12 |
mandriva | linux | lib64mysql12-devel | p-cpe:/a:mandriva:linux:lib64mysql12-devel |
mandriva | linux | libmysql12 | p-cpe:/a:mandriva:linux:libmysql12 |
mandriva | linux | libmysql12-devel | p-cpe:/a:mandriva:linux:libmysql12-devel |
mandrakesoft | mandrake_linux | 10.0 | cpe:/o:mandrakesoft:mandrake_linux:10.0 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0638
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0639
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0709
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0710
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0711