The version of MySQL 5.1 installed on the remote host is earlier than 5.1.62. It is, therefore, affected by the following vulnerabilities :
An error exists related to the included yaSSL component that could allow arbitrary code execution.
(CVE-2012-0882)
Errors exist related to ‘Server Optimizer’, ‘Server DML’, ‘Partition’ and, in combination with InnoDB, ‘HANDLER READ NEXT’ that could allow denial of service attacks. (CVE-2012-1688, CVE-2012-1690, CVE-2012-1703, CVE-2012-2102)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(58802);
script_version("1.11");
script_cvs_date("Date: 2018/11/15 20:50:21");
script_cve_id(
"CVE-2012-0882",
"CVE-2012-1688",
"CVE-2012-1690",
"CVE-2012-1703",
"CVE-2012-2102"
);
script_bugtraq_id(51925, 52931, 53058, 53067, 53074);
script_name(english:"MySQL 5.1 < 5.1.62 Multiple Vulnerabilities");
script_summary(english:"Checks version of MySQL server");
script_set_attribute(
attribute:"synopsis",
value:"The remote database server is affected by multiple vulnerabilities."
);
script_set_attribute(
attribute:"description",
value:
"The version of MySQL 5.1 installed on the remote host is earlier
than 5.1.62. It is, therefore, affected by the following
vulnerabilities :
- An error exists related to the included yaSSL
component that could allow arbitrary code execution.
(CVE-2012-0882)
- Errors exist related to 'Server Optimizer',
'Server DML', 'Partition' and, in combination with
InnoDB, 'HANDLER READ NEXT' that could allow denial of
service attacks. (CVE-2012-1688, CVE-2012-1690,
CVE-2012-1703, CVE-2012-2102)"
);
script_set_attribute(attribute:"see_also", value:"https://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html");
# https://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4225df87");
script_set_attribute(attribute:"see_also", value:"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html");
# https://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4225df87");
script_set_attribute(attribute:"see_also", value:"https://www.openwall.com/lists/oss-security/2012/02/24/2");
script_set_attribute(attribute:"solution", value:"Upgrade to MySQL version 5.1.62 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2012/04/17");
script_set_attribute(attribute:"patch_publication_date", value:"2012/03/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2012/04/19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mysql:mysql");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Databases");
script_copyright(english:"This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("mysql_version.nasl", "mysql_login.nasl");
script_require_keys("Settings/ParanoidReport");
script_require_ports("Services/mysql", 3306);
exit(0);
}
include("mysql_version.inc");
mysql_check_version(fixed:'5.1.62', min:'5.1', severity:SECURITY_WARNING);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0882
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1688
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1690
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1703
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2102
dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html
www.nessus.org/u?4225df87
www.openwall.com/lists/oss-security/2012/02/24/2
www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html