Multiple vulnerabilities were discovered and corrected in mysql :
Joins involving a table with with a unique SET column could cause a server crash (CVE-2010-3677).
Use of TEMPORARY InnoDB tables with nullable columns could cause a server crash (CVE-2010-3680).
The server could crash if there were alternate reads from two indexes on a table using the HANDLER interface (CVE-2010-3681).
Using EXPLAIN with queries of the form SELECT … UNION … ORDER BY (SELECT … WHERE …) could cause a server crash (CVE-2010-3682).
During evaluation of arguments to extreme-value functions (such as LEAST() and GREATEST()), type errors did not propagate properly, causing the server to crash (CVE-2010-3833).
The server could crash after materializing a derived table that required a temporary table for grouping (CVE-2010-3834).
A user-variable assignment expression that is evaluated in a logical expression context can be precalculated in a temporary table for GROUP BY. However, when the expression value is used after creation of the temporary table, it was re-evaluated, not read from the table and a server crash resulted (CVE-2010-3835).
Pre-evaluation of LIKE predicates during view preparation could cause a server crash (CVE-2010-3836).
GROUP_CONCAT() and WITH ROLLUP together could cause a server crash (CVE-2010-3837).
Queries could cause a server crash if the GREATEST() or LEAST() function had a mixed list of numeric and LONGBLOB arguments, and the result of such a function was processed using an intermediate temporary table (CVE-2010-3838).
Queries with nested joins could cause an infinite loop in the server when used from stored procedures and prepared statements (CVE-2010-3839).
The PolyFromWKB() function could crash the server when improper WKB data was passed to the function (CVE-2010-3840).
Additionally the default behaviour of using the mysqlmanager instead of the mysqld_safe script has been reverted in the SysV init script because of instability issues with the mysqlmanager.
Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=4 90
The updated packages have been upgraded to mysql 5.0.91 and patched to correct these issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Mandriva Linux Security Advisory MDVSA-2010:222.
# The text itself is copyright (C) Mandriva S.A.
#
if (NASL_LEVEL < 3000) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(50533);
script_version("1.16");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2010-3677", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3834", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840");
script_bugtraq_id(42598, 42599, 42633, 42646, 43676);
script_xref(name:"MDVSA", value:"2010:222");
script_name(english:"Mandriva Linux Security Advisory : mysql (MDVSA-2010:222)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Mandriva Linux host is missing one or more security
updates."
);
script_set_attribute(
attribute:"description",
value:
"Multiple vulnerabilities were discovered and corrected in mysql :
- Joins involving a table with with a unique SET column
could cause a server crash (CVE-2010-3677).
- Use of TEMPORARY InnoDB tables with nullable columns
could cause a server crash (CVE-2010-3680).
- The server could crash if there were alternate reads
from two indexes on a table using the HANDLER interface
(CVE-2010-3681).
- Using EXPLAIN with queries of the form SELECT ... UNION
... ORDER BY (SELECT ... WHERE ...) could cause a server
crash (CVE-2010-3682).
- During evaluation of arguments to extreme-value
functions (such as LEAST() and GREATEST()), type errors
did not propagate properly, causing the server to crash
(CVE-2010-3833).
- The server could crash after materializing a derived
table that required a temporary table for grouping
(CVE-2010-3834).
- A user-variable assignment expression that is evaluated
in a logical expression context can be precalculated in
a temporary table for GROUP BY. However, when the
expression value is used after creation of the temporary
table, it was re-evaluated, not read from the table and
a server crash resulted (CVE-2010-3835).
- Pre-evaluation of LIKE predicates during view
preparation could cause a server crash (CVE-2010-3836).
- GROUP_CONCAT() and WITH ROLLUP together could cause a
server crash (CVE-2010-3837).
- Queries could cause a server crash if the GREATEST() or
LEAST() function had a mixed list of numeric and
LONGBLOB arguments, and the result of such a function
was processed using an intermediate temporary table
(CVE-2010-3838).
- Queries with nested joins could cause an infinite loop
in the server when used from stored procedures and
prepared statements (CVE-2010-3839).
- The PolyFromWKB() function could crash the server when
improper WKB data was passed to the function
(CVE-2010-3840).
Additionally the default behaviour of using the mysqlmanager instead
of the mysqld_safe script has been reverted in the SysV init script
because of instability issues with the mysqlmanager.
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=4
90
The updated packages have been upgraded to mysql 5.0.91 and patched to
correct these issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.mysql.com/bug.php?id=51875"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.mysql.com/bug.php?id=52711"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.mysql.com/bug.php?id=53544"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.mysql.com/bug.php?id=54007"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.mysql.com/bug.php?id=54044"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.mysql.com/bug.php?id=54461"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.mysql.com/bug.php?id=54476"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.mysql.com/bug.php?id=54568"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.mysql.com/bug.php?id=54575"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.mysql.com/bug.php?id=55564"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.mysql.com/bug.php?id=55568"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.mysql.com/bug.php?id=55826"
);
script_set_attribute(
attribute:"see_also",
value:"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64mysql-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64mysql-static-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64mysql15");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libmysql-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libmysql-static-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libmysql15");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mysql");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mysql-bench");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mysql-client");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mysql-common");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mysql-doc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mysql-max");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mysql-ndb-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mysql-ndb-management");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mysql-ndb-storage");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mysql-ndb-tools");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2009.0");
script_set_attribute(attribute:"patch_publication_date", value:"2010/11/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/11/10");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Mandriva Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
flag = 0;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64mysql-devel-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64mysql-static-devel-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64mysql15-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libmysql-devel-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libmysql-static-devel-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libmysql15-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", reference:"mysql-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", reference:"mysql-bench-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", reference:"mysql-client-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", reference:"mysql-common-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", reference:"mysql-doc-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", reference:"mysql-max-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", reference:"mysql-ndb-extra-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", reference:"mysql-ndb-management-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", reference:"mysql-ndb-storage-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", reference:"mysql-ndb-tools-5.0.91-0.1mdv2009.0", yank:"mdv")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
mandriva | linux | lib64mysql-devel | p-cpe:/a:mandriva:linux:lib64mysql-devel |
mandriva | linux | lib64mysql-static-devel | p-cpe:/a:mandriva:linux:lib64mysql-static-devel |
mandriva | linux | lib64mysql15 | p-cpe:/a:mandriva:linux:lib64mysql15 |
mandriva | linux | libmysql-devel | p-cpe:/a:mandriva:linux:libmysql-devel |
mandriva | linux | libmysql-static-devel | p-cpe:/a:mandriva:linux:libmysql-static-devel |
mandriva | linux | libmysql15 | p-cpe:/a:mandriva:linux:libmysql15 |
mandriva | linux | mysql | p-cpe:/a:mandriva:linux:mysql |
mandriva | linux | mysql-bench | p-cpe:/a:mandriva:linux:mysql-bench |
mandriva | linux | mysql-client | p-cpe:/a:mandriva:linux:mysql-client |
mandriva | linux | mysql-common | p-cpe:/a:mandriva:linux:mysql-common |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3677
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3680
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3681
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3682
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3833
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3834
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3835
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3836
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3837
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3838
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3839
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3840
dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html
bugs.mysql.com/bug.php?id=51875
bugs.mysql.com/bug.php?id=52711
bugs.mysql.com/bug.php?id=53544
bugs.mysql.com/bug.php?id=54007
bugs.mysql.com/bug.php?id=54044
bugs.mysql.com/bug.php?id=54461
bugs.mysql.com/bug.php?id=54476
bugs.mysql.com/bug.php?id=54568
bugs.mysql.com/bug.php?id=54575
bugs.mysql.com/bug.php?id=55564
bugs.mysql.com/bug.php?id=55568
bugs.mysql.com/bug.php?id=55826