Lucene search

K
nessusThis script is Copyright (C) 2002-2018 and is owned by Tenable, Inc. or an Affiliate thereof.MYSQL_MULTIPLE_FLAWS.NASL
HistoryDec 12, 2002 - 12:00 a.m.

MySQL < 3.23.54 / 4.0.6 Multiple Vulnerabilities

2002-12-1200:00:00
This script is Copyright (C) 2002-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
28

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.129

Percentile

95.5%

The remote host is running a version of MySQL older than 3.23.54 or 4.0.6.

The remote version of this product contains several flaw that could allow an attacker to crash this service remotely.

#
# (C) Tenable Network Security, Inc.
#

# Ref: 
# From: Stefan Esser <[email protected]>
# Message-ID: <[email protected]>
# To: [email protected]
# Cc: [email protected], [email protected]
# Subject: [VulnWatch] Advisory 04/2002: Multiple MySQL vulnerabilities
#
# URL:
# http://security.e-matters.de/advisories/042002.html 
#

include("compat.inc");

if (description)
{
 
 script_id(11192);  
 script_version("1.33");
 script_cvs_date("Date: 2018/07/16 14:09:13");

 script_cve_id("CVE-2002-1373", "CVE-2002-1374", "CVE-2002-1375", "CVE-2002-1376");
 script_bugtraq_id(6368, 6370, 6373, 6374, 6375, 8796);
 script_xref(name:"RHSA", value:"2002:166");
 script_xref(name:"RHSA", value:"2002:288");
 script_xref(name:"RHSA", value:"2002:289");
 script_xref(name:"SuSE", value:"SUSE-SA");
 
 script_name(english:"MySQL < 3.23.54 / 4.0.6 Multiple Vulnerabilities");
 script_summary(english:"Checks for the remote MySQL version");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote database server could be disabled remotely.");
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of MySQL older than 3.23.54 or
4.0.6. 

The remote version of this product contains several flaw that could
allow an attacker to crash this service remotely.");
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4e1b5afc");
 script_set_attribute(attribute:"solution", value:
"Upgrade MySQL to version 3.23.54 or 4.0.6.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"2002/12/12");
 script_set_attribute(attribute:"plugin_publication_date", value:"2002/12/12");

 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:mysql:mysql");
 script_end_attributes();
 
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2002-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"Databases");

 script_dependencies("mysql_version.nasl", "mysql_login.nasl");
 script_require_ports("Services/mysql", 3306);
 script_require_keys("Settings/ParanoidReport");

 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("mysql_func.inc");


# nb: banner checks of open source software are prone to false-
#     positives so only run the check if reporting is paranoid.
if (report_paranoia < 2)
  exit(1, "This plugin only runs if 'Report paranoia' is set to 'Paranoid'.");

port = get_service(svc:"mysql", default:3306, exit_on_fail:TRUE);

if (mysql_init(port:port, exit_on_fail:TRUE) == 1)
{
  version = mysql_get_version();

  if (
    strlen(version) &&
    version =~ "^3\.(([0-9]\..*|(1[0-9]\..*)|(2[0-2]\..*))|23\.([0-4][0-9]|5[0-3])[^0-9])"
  )
  {
    if (report_verbosity > 0)
    {
      report = '\nThe remote MySQL server\'s version is :\n\n  '+version+'\n';
      datadir = get_kb_item('mysql/' + port + '/datadir');
      if (!empty_or_null(datadir))
      {
        report += '  Data Dir          : ' + datadir + '\n';
      }
      databases = get_kb_item('mysql/' + port + '/databases');
      if (!empty_or_null(databases))
      { 
        report += '  Databases         :\n' + databases;
      }
      security_warning(port:port, extra:report);
    }
    else security_warning(port);
  }
}
mysql_close();
VendorProductVersionCPE
mysqlmysqlcpe:/a:mysql:mysql

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.129

Percentile

95.5%

Related for MYSQL_MULTIPLE_FLAWS.NASL