Ubuntu: Security Advisory (USN-1621-1) - Update available for 'mysql-5.1, mysql-5.5, mysql-dfsg-5.1' package(s) on Ubuntu 10.04, 11.10, 12.04, 12.1
Reporter | Title | Published | Views | Family All 133 |
---|---|---|---|---|
![]() | MySQL vulnerabilities | 5 Nov 201200:00 | – | ubuntu |
![]() | Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : mysql-5.1, mysql-5.5, mysql-dfsg-5.1 vulnerabilities (USN-1621-1) | 6 Nov 201200:00 | – | nessus |
![]() | Debian DSA-2581-1 : mysql-5.1 - several vulnerabilities | 5 Dec 201200:00 | – | nessus |
![]() | MySQL 5.5 < 5.5.27 Multiple Vulnerabilities | 19 Oct 201200:00 | – | nessus |
![]() | MariaDB 5.5.0 < 5.5.27 Multiple Vulnerabilities | 18 Nov 202200:00 | – | nessus |
![]() | MySQL 5.1 < 5.1.65 Multiple Vulnerabilities | 19 Oct 201200:00 | – | nessus |
![]() | MySQL 5.5 < 5.5.26 Multiple Vulnerabilities | 19 Oct 201200:00 | – | nessus |
![]() | CentOS 6 : mysql (CESA-2012:1462) | 15 Nov 201200:00 | – | nessus |
![]() | MySQL 5.1 < 5.1.64 Multiple Vulnerabilities | 19 Oct 201200:00 | – | nessus |
![]() | Oracle Linux 6 : mysql (ELSA-2012-1462) | 12 Jul 201300:00 | – | nessus |
# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.841207");
script_cve_id("CVE-2012-3144", "CVE-2012-3147", "CVE-2012-3149", "CVE-2012-3150", "CVE-2012-3156", "CVE-2012-3158", "CVE-2012-3160", "CVE-2012-3163", "CVE-2012-3166", "CVE-2012-3167", "CVE-2012-3173", "CVE-2012-3177", "CVE-2012-3180", "CVE-2012-3197");
script_tag(name:"creation_date", value:"2012-11-06 12:18:44 +0000 (Tue, 06 Nov 2012)");
script_version("2025-01-14T05:37:02+0000");
script_tag(name:"last_modification", value:"2025-01-14 05:37:02 +0000 (Tue, 14 Jan 2025)");
script_tag(name:"cvss_base", value:"9.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_name("Ubuntu: Security Advisory (USN-1621-1)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2012 Greenbone AG");
script_family("Ubuntu Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU(10\.04\ LTS|11\.10|12\.04\ LTS|12\.10)");
script_xref(name:"Advisory-ID", value:"USN-1621-1");
script_xref(name:"URL", value:"https://ubuntu.com/security/notices/USN-1621-1");
script_xref(name:"URL", value:"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html");
script_xref(name:"URL", value:"http://dev.mysql.com/doc/refman/5.5/en/news-5-5-x.html");
script_xref(name:"URL", value:"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html");
script_xref(name:"URL", value:"https://launchpad.net/bugs/1068158");
script_tag(name:"summary", value:"The remote host is missing an update for the 'mysql-5.1, mysql-5.5, mysql-dfsg-5.1' package(s) announced via the USN-1621-1 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.
MySQL has been updated to 5.1.66 in Ubuntu 10.04 LTS and Ubuntu 11.10.
Ubuntu 12.04 LTS and Ubuntu 12.10 have been updated to MySQL 5.5.28.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
[links moved to references]");
script_tag(name:"affected", value:"'mysql-5.1, mysql-5.5, mysql-dfsg-5.1' package(s) on Ubuntu 10.04, Ubuntu 11.10, Ubuntu 12.04, Ubuntu 12.10.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
release = dpkg_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "UBUNTU10.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"mysql-server-5.1", ver:"5.1.66-0ubuntu0.10.04.1", rls:"UBUNTU10.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "UBUNTU11.10") {
if(!isnull(res = isdpkgvuln(pkg:"mysql-server-5.1", ver:"5.1.66-0ubuntu0.11.10.2", rls:"UBUNTU11.10"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "UBUNTU12.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"mysql-server-5.5", ver:"5.5.28-0ubuntu0.12.04.2", rls:"UBUNTU12.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "UBUNTU12.10") {
if(!isnull(res = isdpkgvuln(pkg:"mysql-server-5.5", ver:"5.5.28-0ubuntu0.12.10.1", rls:"UBUNTU12.10"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo