ID OPENVAS:830297 Type openvas Reporter Copyright (C) 2009 Greenbone Networks GmbH Modified 2017-07-06T00:00:00
Description
Check for the Version of MySQL
###############################################################################
# OpenVAS Vulnerability Test
#
# Mandriva Update for MySQL MDKSA-2007:177 (MySQL)
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
tag_insight = "A vulnerability was found in MySQL's authentication protocol, making
it possible for a remote unauthenticated attacker to send a specially
crafted authentication request to the MySQL server causing it to crash
(CVE-2007-3780).
Another flaw was discovered in MySQL that allowed remote authenticated
users to gain update privileges for a table in another database via
a view that refers to the external table (CVE-2007-3782).
Updated packages have been patched to prevent these issues.";
tag_affected = "MySQL on Mandriva Linux 2007.0,
Mandriva Linux 2007.0/X86_64,
Mandriva Linux 2007.1,
Mandriva Linux 2007.1/X86_64";
tag_solution = "Please Install the Updated Packages.";
if(description)
{
script_xref(name : "URL" , value : "http://lists.mandriva.com/security-announce/2007-09/msg00005.php");
script_id(830297);
script_version("$Revision: 6568 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-06 15:04:21 +0200 (Thu, 06 Jul 2017) $");
script_tag(name:"creation_date", value:"2009-04-09 13:57:01 +0200 (Thu, 09 Apr 2009)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_xref(name: "MDKSA", value: "2007:177");
script_cve_id("CVE-2007-3780", "CVE-2007-3782");
script_name( "Mandriva Update for MySQL MDKSA-2007:177 (MySQL)");
script_summary("Check for the Version of MySQL");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2009 Greenbone Networks GmbH");
script_family("Mandrake Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/mandriva_mandrake_linux", "ssh/login/release");
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "insight" , value : tag_insight);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "MNDK_2007.1")
{
if ((res = isrpmvuln(pkg:"MySQL", rpm:"MySQL~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-Max", rpm:"MySQL-Max~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-bench", rpm:"MySQL-bench~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-client", rpm:"MySQL-client~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-common", rpm:"MySQL-common~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-ndb-extra", rpm:"MySQL-ndb-extra~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-ndb-management", rpm:"MySQL-ndb-management~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-ndb-storage", rpm:"MySQL-ndb-storage~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-ndb-tools", rpm:"MySQL-ndb-tools~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libmysql15", rpm:"libmysql15~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libmysql15-devel", rpm:"libmysql15-devel~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libmysql15-static-devel", rpm:"libmysql15-static-devel~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64mysql15", rpm:"lib64mysql15~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64mysql15-devel", rpm:"lib64mysql15-devel~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64mysql15-static-devel", rpm:"lib64mysql15-static-devel~5.0.37~2.2mdv2007.1", rls:"MNDK_2007.1")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
if(release == "MNDK_2007.0")
{
if ((res = isrpmvuln(pkg:"MySQL", rpm:"MySQL~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-Max", rpm:"MySQL-Max~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-bench", rpm:"MySQL-bench~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-client", rpm:"MySQL-client~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-common", rpm:"MySQL-common~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-ndb-extra", rpm:"MySQL-ndb-extra~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-ndb-management", rpm:"MySQL-ndb-management~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-ndb-storage", rpm:"MySQL-ndb-storage~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"MySQL-ndb-tools", rpm:"MySQL-ndb-tools~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libmysql15", rpm:"libmysql15~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libmysql15-devel", rpm:"libmysql15-devel~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libmysql15-static-devel", rpm:"libmysql15-static-devel~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64mysql15", rpm:"lib64mysql15~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64mysql15-devel", rpm:"lib64mysql15-devel~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64mysql15-static-devel", rpm:"lib64mysql15-static-devel~5.0.24a~2.2mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
{"id": "OPENVAS:830297", "type": "openvas", "bulletinFamily": "scanner", "title": "Mandriva Update for MySQL MDKSA-2007:177 (MySQL)", "description": "Check for the Version of MySQL", "published": "2009-04-09T00:00:00", "modified": "2017-07-06T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=830297", "reporter": "Copyright (C) 2009 Greenbone Networks GmbH", "references": ["http://lists.mandriva.com/security-announce/2007-09/msg00005.php", "2007:177"], "cvelist": ["CVE-2007-3780", "CVE-2007-3782"], "lastseen": "2017-07-24T12:56:19", "viewCount": 0, "enchantments": {"score": {"value": 6.0, "vector": "NONE", "modified": "2017-07-24T12:56:19", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2007-3780", "CVE-2007-3782"]}, {"type": "openvas", "idList": ["OPENVAS:58545", "OPENVAS:870069", "OPENVAS:63170", "OPENVAS:1361412562310830297", "OPENVAS:1361412562310870069", "OPENVAS:840042", "OPENVAS:59638", "OPENVAS:136141256231063170", "OPENVAS:1361412562310122583"]}, {"type": "nessus", "idList": ["CENTOS_RHSA-2007-0875.NASL", "UBUNTU_USN-528-1.NASL", "SUSE_MYSQL-4375.NASL", "MANDRAKE_MDKSA-2007-177.NASL", "REDHAT-RHSA-2007-0875.NASL", "MYSQL_5_0_45.NASL", "ORACLELINUX_ELSA-2007-0875.NASL", "SL_20070830_MYSQL_ON_SL5_X.NASL", "SUSE_MYSQL-4376.NASL", "FREEBSD_PKG_240AC24CDFF311DDA7650030843D3802.NASL"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:8064", "SECURITYVULNS:DOC:17827", "SECURITYVULNS:VULN:8248", "SECURITYVULNS:DOC:18185"]}, {"type": "ubuntu", "idList": ["USN-528-1"]}, {"type": "redhat", "idList": ["RHSA-2008:0364", "RHSA-2007:0875", "RHSA-2007:0894"]}, {"type": "osvdb", "idList": ["OSVDB:37782", "OSVDB:36732"]}, {"type": "centos", "idList": ["CESA-2007:0875"]}, {"type": "oraclelinux", "idList": ["ELSA-2007-0875", "ELSA-2008-0364"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1413-1:E917F"]}, {"type": "freebsd", "idList": ["240AC24C-DFF3-11DD-A765-0030843D3802"]}, {"type": "gentoo", "idList": ["GLSA-200708-10"]}], "modified": "2017-07-24T12:56:19", "rev": 2}, "vulnersScore": 6.0}, "pluginID": "830297", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for MySQL MDKSA-2007:177 (MySQL)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability was found in MySQL's authentication protocol, making\n it possible for a remote unauthenticated attacker to send a specially\n crafted authentication request to the MySQL server causing it to crash\n (CVE-2007-3780).\n\n Another flaw was discovered in MySQL that allowed remote authenticated\n users to gain update privileges for a table in another database via\n a view that refers to the external table (CVE-2007-3782).\n \n Updated packages have been patched to prevent these issues.\";\n\ntag_affected = \"MySQL on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64,\n Mandriva Linux 2007.1,\n Mandriva Linux 2007.1/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-09/msg00005.php\");\n script_id(830297);\n script_version(\"$Revision: 6568 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:04:21 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:57:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:177\");\n script_cve_id(\"CVE-2007-3780\", \"CVE-2007-3782\");\n script_name( \"Mandriva Update for MySQL MDKSA-2007:177 (MySQL)\");\n\n script_summary(\"Check for the Version of MySQL\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"MySQL\", rpm:\"MySQL~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-Max\", rpm:\"MySQL-Max~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-bench\", rpm:\"MySQL-bench~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-client\", rpm:\"MySQL-client~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-common\", rpm:\"MySQL-common~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-extra\", rpm:\"MySQL-ndb-extra~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-management\", rpm:\"MySQL-ndb-management~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-storage\", rpm:\"MySQL-ndb-storage~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-tools\", rpm:\"MySQL-ndb-tools~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql15\", rpm:\"libmysql15~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql15-devel\", rpm:\"libmysql15-devel~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql15-static-devel\", rpm:\"libmysql15-static-devel~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15\", rpm:\"lib64mysql15~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15-devel\", rpm:\"lib64mysql15-devel~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15-static-devel\", rpm:\"lib64mysql15-static-devel~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"MySQL\", rpm:\"MySQL~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-Max\", rpm:\"MySQL-Max~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-bench\", rpm:\"MySQL-bench~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-client\", rpm:\"MySQL-client~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-common\", rpm:\"MySQL-common~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-extra\", rpm:\"MySQL-ndb-extra~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-management\", rpm:\"MySQL-ndb-management~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-storage\", rpm:\"MySQL-ndb-storage~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-tools\", rpm:\"MySQL-ndb-tools~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql15\", rpm:\"libmysql15~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql15-devel\", rpm:\"libmysql15-devel~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql15-static-devel\", rpm:\"libmysql15-static-devel~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15\", rpm:\"lib64mysql15~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15-devel\", rpm:\"lib64mysql15-devel~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15-static-devel\", rpm:\"lib64mysql15-static-devel~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "naslFamily": "Mandrake Local Security Checks"}
{"cve": [{"lastseen": "2021-02-02T05:31:25", "description": "MySQL Community Server before 5.0.45 allows remote authenticated users to gain update privileges for a table in another database via a view that refers to this external table.", "edition": 4, "cvss3": {}, "published": "2007-07-15T22:30:00", "title": "CVE-2007-3782", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-3782"], "modified": "2018-10-15T21:30:00", "cpe": ["cpe:/a:mysql:community_server:5.0.41", "cpe:/a:mysql:community_server:5.0.44"], "id": "CVE-2007-3782", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-3782", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:mysql:community_server:5.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:community_server:5.0.44:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:31:25", "description": "MySQL Community Server before 5.0.45 allows remote attackers to cause a denial of service (daemon crash) via a malformed password packet in the connection protocol.", "edition": 6, "cvss3": {}, "published": "2007-07-15T22:30:00", "title": "CVE-2007-3780", "type": "cve", "cwe": ["NVD-CWE-noinfo", "CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-3780"], "modified": "2018-10-15T21:30:00", "cpe": ["cpe:/a:mysql:community_server:5.0.41"], "id": "CVE-2007-3780", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-3780", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:mysql:community_server:5.0.41:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2018-04-09T11:39:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3780", "CVE-2007-3782"], "description": "Check for the Version of MySQL", "modified": "2018-04-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:1361412562310830297", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830297", "type": "openvas", "title": "Mandriva Update for MySQL MDKSA-2007:177 (MySQL)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for MySQL MDKSA-2007:177 (MySQL)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability was found in MySQL's authentication protocol, making\n it possible for a remote unauthenticated attacker to send a specially\n crafted authentication request to the MySQL server causing it to crash\n (CVE-2007-3780).\n\n Another flaw was discovered in MySQL that allowed remote authenticated\n users to gain update privileges for a table in another database via\n a view that refers to the external table (CVE-2007-3782).\n \n Updated packages have been patched to prevent these issues.\";\n\ntag_affected = \"MySQL on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64,\n Mandriva Linux 2007.1,\n Mandriva Linux 2007.1/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-09/msg00005.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830297\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:57:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:177\");\n script_cve_id(\"CVE-2007-3780\", \"CVE-2007-3782\");\n script_name( \"Mandriva Update for MySQL MDKSA-2007:177 (MySQL)\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of MySQL\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"MySQL\", rpm:\"MySQL~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-Max\", rpm:\"MySQL-Max~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-bench\", rpm:\"MySQL-bench~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-client\", rpm:\"MySQL-client~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-common\", rpm:\"MySQL-common~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-extra\", rpm:\"MySQL-ndb-extra~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-management\", rpm:\"MySQL-ndb-management~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-storage\", rpm:\"MySQL-ndb-storage~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-tools\", rpm:\"MySQL-ndb-tools~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql15\", rpm:\"libmysql15~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql15-devel\", rpm:\"libmysql15-devel~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql15-static-devel\", rpm:\"libmysql15-static-devel~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15\", rpm:\"lib64mysql15~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15-devel\", rpm:\"lib64mysql15-devel~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15-static-devel\", rpm:\"lib64mysql15-static-devel~5.0.37~2.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"MySQL\", rpm:\"MySQL~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-Max\", rpm:\"MySQL-Max~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-bench\", rpm:\"MySQL-bench~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-client\", rpm:\"MySQL-client~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-common\", rpm:\"MySQL-common~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-extra\", rpm:\"MySQL-ndb-extra~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-management\", rpm:\"MySQL-ndb-management~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-storage\", rpm:\"MySQL-ndb-storage~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MySQL-ndb-tools\", rpm:\"MySQL-ndb-tools~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql15\", rpm:\"libmysql15~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql15-devel\", rpm:\"libmysql15-devel~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql15-static-devel\", rpm:\"libmysql15-static-devel~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15\", rpm:\"lib64mysql15~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15-devel\", rpm:\"lib64mysql15-devel~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15-static-devel\", rpm:\"lib64mysql15-static-devel~5.0.24a~2.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-12-04T11:29:01", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-2583", "CVE-2007-3780", "CVE-2007-3782", "CVE-2007-2691"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-528-1", "modified": "2017-12-01T00:00:00", "published": "2009-03-23T00:00:00", "id": "OPENVAS:840042", "href": "http://plugins.openvas.org/nasl.php?oid=840042", "type": "openvas", "title": "Ubuntu Update for mysql-dfsg-5.0 vulnerabilities USN-528-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_528_1.nasl 7969 2017-12-01 09:23:16Z santu $\n#\n# Ubuntu Update for mysql-dfsg-5.0 vulnerabilities USN-528-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Neil Kettle discovered that MySQL could be made to dereference a NULL\n pointer and divide by zero. An authenticated user could exploit this\n with a crafted IF clause, leading to a denial of service. (CVE-2007-2583)\n\n Victoria Reznichenko discovered that MySQL did not always require the\n DROP privilege. An authenticated user could exploit this via RENAME\n TABLE statements to rename arbitrary tables, possibly gaining additional\n database access. (CVE-2007-2691)\n \n It was discovered that MySQL could be made to overflow a signed char\n during authentication. Remote attackers could use crafted authentication\n requests to cause a denial of service. (CVE-2007-3780)\n \n Phil Anderton discovered that MySQL did not properly verify access\n privileges when accessing external tables. As a result, authenticated\n users could exploit this to obtain UPDATE privileges to external\n tables. (CVE-2007-3782)\n \n In certain situations, when installing or upgrading mysql, there was no\n notification that the mysql root user password needed to be set. If the\n password was left unset, attackers would be able to obtain unrestricted\n access to mysql. This is now checked during mysql start-up.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-528-1\";\ntag_affected = \"mysql-dfsg-5.0 vulnerabilities on Ubuntu 6.06 LTS ,\n Ubuntu 6.10 ,\n Ubuntu 7.04\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-528-1/\");\n script_id(840042);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"USN\", value: \"528-1\");\n script_cve_id(\"CVE-2007-2583\", \"CVE-2007-2691\", \"CVE-2007-3780\", \"CVE-2007-3782\");\n script_name( \"Ubuntu Update for mysql-dfsg-5.0 vulnerabilities USN-528-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU7.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15-dev\", ver:\"5.0.38-0ubuntu1.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15off\", ver:\"5.0.38-0ubuntu1.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.0_5.0.38-0ubuntu1.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"4.1_5.0.38-0ubuntu1.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.0_5.0.38-0ubuntu1.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.0.38-0ubuntu1.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"5.0.38-0ubuntu1.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.0.38-0ubuntu1.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15-dev\", ver:\"5.0.22-0ubuntu6.06.5\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15off\", ver:\"5.0.22-0ubuntu6.06.5\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.0_5.0.22-0ubuntu6.06.5\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.0_5.0.22-0ubuntu6.06.5\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.0.22-0ubuntu6.06.5\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"5.0.22-0ubuntu6.06.5\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.0.22-0ubuntu6.06.5\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15-dev\", ver:\"5.0.24a-9ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15off\", ver:\"5.0.24a-9ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.0_5.0.24a-9ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.0_5.0.24a-9ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.0.24a-9ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"5.0.24a-9ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.0.24a-9ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:50:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-2583", "CVE-2007-3780", "CVE-2007-5925", "CVE-2007-3782", "CVE-2007-2692", "CVE-2007-2691"], "description": "The remote host is missing an update to mysql-dfsg, mysql-dfsg-5.0, mysql-dfsg-4.1\nannounced via advisory DSA 1413-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:59638", "href": "http://plugins.openvas.org/nasl.php?oid=59638", "type": "openvas", "title": "Debian Security Advisory DSA 1413-1 (mysql-dfsg, mysql-dfsg-5.0, mysql-dfsg-4.1)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1413_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1413-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several vulnerabilities have been found in the MySQL database packages\nwith implications ranging from unauthorized database modifications to\nremotely triggered server crashes.\n\nCVE-2007-2583\n\nThe in_decimal::set function in item_cmpfunc.cc in MySQL\nbefore 5.0.40 allows context-dependent attackers to cause a\ndenial of service (crash) via a crafted IF clause that results\nin a divide-by-zero error and a NULL pointer dereference.\n(Affects source version 5.0.32)\n\nCVE-2007-2691\n\nMySQL does not require the DROP privilege for RENAME TABLE\nstatements, which allows remote authenticated users to rename\narbitrary tables. (All supported versions affected.)\n\nCVE-2007-2692\n\nThe mysql_change_db function does not restore THD::db_access\nprivileges when returning from SQL SECURITY INVOKER stored\nroutines, which allows remote authenticated users to gain\nprivileges. (Affects source version 5.0.32)\n\nCVE-2007-3780\n\nMySQL could be made to overflow a signed char during\nauthentication. Remote attackers could use specially crafted\nauthentication requests to cause a denial of\nservice. (Upstream source versions 4.1.11a and 5.0.32\naffected.)\n\nCVE-2007-3782\n\nPhil Anderton discovered that MySQL did not properly verify\naccess privileges when accessing external tables. As a result,\nauthenticated users could exploit this to obtain UPDATE\nprivileges to external tables. (Affects source version\n5.0.32)\n\nCVE-2007-5925\n\nThe convert_search_mode_to_innobase function in ha_innodb.cc\nin the InnoDB engine in MySQL 5.1.23-BK and earlier allows\nremote authenticated users to cause a denial of service\n(database crash) via a certain CONTAINS operation on an\nindexed column, which triggers an assertion error. (Affects\nsource version 5.0.32)\n\n\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 5.0.32-7etch3 of the mysql-dfsg-5.0 packages\n\nFor the old stable distribution (sarge), these problems have been\nfixed in version 4.0.24-10sarge3 of mysql-dfsg and version\n4.1.11a-4sarge8 of mysql-dfsg-4.1\n\nWe recommend that you upgrade your mysql packages.\";\ntag_summary = \"The remote host is missing an update to mysql-dfsg, mysql-dfsg-5.0, mysql-dfsg-4.1\nannounced via advisory DSA 1413-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201413-1\";\n\nif(description)\n{\n script_id(59638);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:23:47 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2007-2583\", \"CVE-2007-2691\", \"CVE-2007-2692\", \"CVE-2007-3780\", \"CVE-2007-3782\", \"CVE-2007-5925\");\n script_tag(name:\"cvss_base\", value:\"6.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:P/I:P/A:P\");\n script_name(\"Debian Security Advisory DSA 1413-1 (mysql-dfsg, mysql-dfsg-5.0, mysql-dfsg-4.1)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"5.0.32-7etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.0.32-7etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.0.32-7etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mysql-server-5.0\", ver:\"5.0.32-7etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mysql-client-5.0\", ver:\"5.0.32-7etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmysqlclient15off\", ver:\"5.0.32-7etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mysql-server-4.1\", ver:\"5.0.32-7etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmysqlclient15-dev\", ver:\"5.0.32-7etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"4.0.24-10sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mysql-common-4.1\", ver:\"4.1.11a-4sarge8\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"4.0.24-10sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"4.0.24-10sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mysql-server-4.1\", ver:\"4.1.11a-4sarge8\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmysqlclient12-dev\", ver:\"4.0.24-10sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mysql-client-4.1\", ver:\"4.1.11a-4sarge8\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmysqlclient14\", ver:\"4.1.11a-4sarge8\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmysqlclient14-dev\", ver:\"4.1.11a-4sarge8\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmysqlclient12\", ver:\"4.0.24-10sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.0, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:40:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3780"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2018-04-06T00:00:00", "published": "2009-01-13T00:00:00", "id": "OPENVAS:136141256231063170", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063170", "type": "openvas", "title": "FreeBSD Ports: mysql-server", "sourceData": "#\n#VID 240ac24c-dff3-11dd-a765-0030843d3802\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID 240ac24c-dff3-11dd-a765-0030843d3802\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: mysql-server\n\nCVE-2007-3780\nMySQL Community Server before 5.0.45 allows remote attackers to cause\na denial of service (daemon crash) via a malformed password packet in\nthe connection protocol.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://bugs.mysql.com/bug.php?id=28984\nhttp://www.vuxml.org/freebsd/240ac24c-dff3-11dd-a765-0030843d3802.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63170\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-13 22:38:32 +0100 (Tue, 13 Jan 2009)\");\n script_cve_id(\"CVE-2007-3780\");\n script_bugtraq_id(25017);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"FreeBSD Ports: mysql-server\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"mysql-server\");\nif(!isnull(bver) && revcomp(a:bver, b:\"4.1\")>=0 && revcomp(a:bver, b:\"4.1.24\")<0) {\n txt += 'Package mysql-server version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"5.0\")>=0 && revcomp(a:bver, b:\"5.0.44\")<0) {\n txt += 'Package mysql-server version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"5.1\")>=0 && revcomp(a:bver, b:\"5.1.20\")<0) {\n txt += 'Package mysql-server version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-02T21:14:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3780"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-12-23T00:00:00", "published": "2009-01-13T00:00:00", "id": "OPENVAS:63170", "href": "http://plugins.openvas.org/nasl.php?oid=63170", "type": "openvas", "title": "FreeBSD Ports: mysql-server", "sourceData": "#\n#VID 240ac24c-dff3-11dd-a765-0030843d3802\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID 240ac24c-dff3-11dd-a765-0030843d3802\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: mysql-server\n\nCVE-2007-3780\nMySQL Community Server before 5.0.45 allows remote attackers to cause\na denial of service (daemon crash) via a malformed password packet in\nthe connection protocol.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://bugs.mysql.com/bug.php?id=28984\nhttp://www.vuxml.org/freebsd/240ac24c-dff3-11dd-a765-0030843d3802.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\n\nif(description)\n{\n script_id(63170);\n script_version(\"$Revision: 4847 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-12-23 10:33:16 +0100 (Fri, 23 Dec 2016) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-13 22:38:32 +0100 (Tue, 13 Jan 2009)\");\n script_cve_id(\"CVE-2007-3780\");\n script_bugtraq_id(25017);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"FreeBSD Ports: mysql-server\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"mysql-server\");\nif(!isnull(bver) && revcomp(a:bver, b:\"4.1\")>=0 && revcomp(a:bver, b:\"4.1.24\")<0) {\n txt += 'Package mysql-server version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"5.0\")>=0 && revcomp(a:bver, b:\"5.0.44\")<0) {\n txt += 'Package mysql-server version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"5.1\")>=0 && revcomp(a:bver, b:\"5.1.20\")<0) {\n txt += 'Package mysql-server version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:50:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3780", "CVE-2007-3781"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200708-10.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "id": "OPENVAS:58545", "href": "http://plugins.openvas.org/nasl.php?oid=58545", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200708-10 (mysql)", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A Denial of Service vulnerability and a table structure information leakage\nvulnerability were found in MySQL.\";\ntag_solution = \"All MySQL users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-db/mysql-5.0.44'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200708-10\nhttp://bugs.gentoo.org/show_bug.cgi?id=185333\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200708-10.\";\n\n \n\nif(description)\n{\n script_id(58545);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2007-3780\", \"CVE-2007-3781\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200708-10 (mysql)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"dev-db/mysql\", unaffected: make_list(\"ge 5.0.44\"), vulnerable: make_list(\"lt 5.0.44\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:36:19", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-2583", "CVE-2006-7232", "CVE-2006-4227", "CVE-2007-3781", "CVE-2006-4031", "CVE-2007-1420", "CVE-2007-3782", "CVE-2006-0903", "CVE-2007-2692", "CVE-2007-2691"], "description": "Oracle Linux Local Security Checks ELSA-2008-0364", "modified": "2018-09-28T00:00:00", "published": "2015-10-08T00:00:00", "id": "OPENVAS:1361412562310122583", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122583", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2008-0364", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2008-0364.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122583\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-08 14:48:37 +0300 (Thu, 08 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2008-0364\");\n script_tag(name:\"insight\", value:\"ELSA-2008-0364 - mysql security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2008-0364\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2008-0364.html\");\n script_cve_id(\"CVE-2006-7232\", \"CVE-2007-1420\", \"CVE-2007-2583\", \"CVE-2007-2691\", \"CVE-2007-2692\", \"CVE-2007-3781\", \"CVE-2007-3782\", \"CVE-2006-0903\", \"CVE-2006-4031\", \"CVE-2006-4227\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.0.45~7.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.0.45~7.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.0.45~7.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.0.45~7.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.0.45~7.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2018-04-09T11:38:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-2583", "CVE-2006-7232", "CVE-2006-4227", "CVE-2007-3781", "CVE-2006-4031", "CVE-2007-1420", "CVE-2007-3782", "CVE-2006-0903", "CVE-2007-2692", "CVE-2007-2691"], "description": "Check for the Version of mysql", "modified": "2018-04-06T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:1361412562310870069", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870069", "type": "openvas", "title": "RedHat Update for mysql RHSA-2008:0364-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for mysql RHSA-2008:0364-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\n client/server implementation consisting of a server daemon (mysqld), and\n many different client programs and libraries.\n\n MySQL did not require privileges such as "SELECT" for the source table in a\n "CREATE TABLE LIKE" statement. An authenticated user could obtain sensitive\n information, such as the table structure. (CVE-2007-3781)\n \n A flaw was discovered in MySQL that allowed an authenticated user to gain\n update privileges for a table in another database, via a view that refers\n to the external table. (CVE-2007-3782)\n \n MySQL did not require the "DROP" privilege for "RENAME TABLE" statements.\n An authenticated user could use this flaw to rename arbitrary tables.\n (CVE-2007-2691)\n \n A flaw was discovered in the mysql_change_db function when returning from\n SQL SECURITY INVOKER stored routines. An authenticated user could use this\n flaw to gain database privileges. (CVE-2007-2692)\n \n MySQL allowed an authenticated user to bypass logging mechanisms via SQL\n queries that contain the NULL character, which were not properly handled by\n the mysql_real_query function. (CVE-2006-0903)\n \n MySQL allowed an authenticated user to access a table through a previously\n created MERGE table, even after the user's privileges were revoked from\n the original table, which might violate intended security policy. This is\n addressed by allowing the MERGE storage engine to be disabled, which can\n be done by running mysqld with the "--skip-merge" option. (CVE-2006-4031)\n \n MySQL evaluated arguments in the wrong security context, which allowed an\n authenticated user to gain privileges through a routine that had been made\n available using "GRANT EXECUTE". (CVE-2006-4227)\n \n Multiple flaws in MySQL allowed an authenticated user to cause the MySQL\n daemon to crash via crafted SQL queries. This only caused a temporary\n denial of service, as the MySQL daemon is automatically restarted after the\n crash. (CVE-2006-7232, CVE-2007-1420, CVE-2007-2583)\n \n As well, these updated packages fix the following bugs:\n \n * a separate counter was used for "insert delayed" statements, which caused\n rows to be discarded. In these updated packages, "insert delayed"\n statements no longer use a separate counter, which resolves this issue.\n \n * due to a bug in the Native POSIX Thread Library, in certain situations,\n "flush tables" caused a deadlock on tables that had a read lock. The mysqld\n daemon had to be ki ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"mysql on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-May/msg00021.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870069\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_xref(name: \"RHSA\", value: \"2008:0364-01\");\n script_cve_id(\"CVE-2006-0903\", \"CVE-2006-4031\", \"CVE-2006-4227\", \"CVE-2006-7232\", \"CVE-2007-1420\", \"CVE-2007-2583\", \"CVE-2007-2691\", \"CVE-2007-2692\", \"CVE-2007-3781\", \"CVE-2007-3782\");\n script_name( \"RedHat Update for mysql RHSA-2008:0364-01\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.0.45~7.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.0.45~7.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-debuginfo\", rpm:\"mysql-debuginfo~5.0.45~7.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.0.45~7.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.0.45~7.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.0.45~7.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-27T10:55:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-2583", "CVE-2006-7232", "CVE-2006-4227", "CVE-2007-3781", "CVE-2006-4031", "CVE-2007-1420", "CVE-2007-3782", "CVE-2006-0903", "CVE-2007-2692", "CVE-2007-2691"], "description": "Check for the Version of mysql", "modified": "2017-07-12T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:870069", "href": "http://plugins.openvas.org/nasl.php?oid=870069", "type": "openvas", "title": "RedHat Update for mysql RHSA-2008:0364-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for mysql RHSA-2008:0364-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\n client/server implementation consisting of a server daemon (mysqld), and\n many different client programs and libraries.\n\n MySQL did not require privileges such as "SELECT" for the source table in a\n "CREATE TABLE LIKE" statement. An authenticated user could obtain sensitive\n information, such as the table structure. (CVE-2007-3781)\n \n A flaw was discovered in MySQL that allowed an authenticated user to gain\n update privileges for a table in another database, via a view that refers\n to the external table. (CVE-2007-3782)\n \n MySQL did not require the "DROP" privilege for "RENAME TABLE" statements.\n An authenticated user could use this flaw to rename arbitrary tables.\n (CVE-2007-2691)\n \n A flaw was discovered in the mysql_change_db function when returning from\n SQL SECURITY INVOKER stored routines. An authenticated user could use this\n flaw to gain database privileges. (CVE-2007-2692)\n \n MySQL allowed an authenticated user to bypass logging mechanisms via SQL\n queries that contain the NULL character, which were not properly handled by\n the mysql_real_query function. (CVE-2006-0903)\n \n MySQL allowed an authenticated user to access a table through a previously\n created MERGE table, even after the user's privileges were revoked from\n the original table, which might violate intended security policy. This is\n addressed by allowing the MERGE storage engine to be disabled, which can\n be done by running mysqld with the "--skip-merge" option. (CVE-2006-4031)\n \n MySQL evaluated arguments in the wrong security context, which allowed an\n authenticated user to gain privileges through a routine that had been made\n available using "GRANT EXECUTE". (CVE-2006-4227)\n \n Multiple flaws in MySQL allowed an authenticated user to cause the MySQL\n daemon to crash via crafted SQL queries. This only caused a temporary\n denial of service, as the MySQL daemon is automatically restarted after the\n crash. (CVE-2006-7232, CVE-2007-1420, CVE-2007-2583)\n \n As well, these updated packages fix the following bugs:\n \n * a separate counter was used for "insert delayed" statements, which caused\n rows to be discarded. In these updated packages, "insert delayed"\n statements no longer use a separate counter, which resolves this issue.\n \n * due to a bug in the Native POSIX Thread Library, in certain situations,\n "flush tables" caused a deadlock on tables that had a read lock. The mysqld\n daemon had to be ki ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"mysql on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-May/msg00021.html\");\n script_id(870069);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_xref(name: \"RHSA\", value: \"2008:0364-01\");\n script_cve_id(\"CVE-2006-0903\", \"CVE-2006-4031\", \"CVE-2006-4227\", \"CVE-2006-7232\", \"CVE-2007-1420\", \"CVE-2007-2583\", \"CVE-2007-2691\", \"CVE-2007-2692\", \"CVE-2007-3781\", \"CVE-2007-3782\");\n script_name( \"RedHat Update for mysql RHSA-2008:0364-01\");\n\n script_summary(\"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.0.45~7.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.0.45~7.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-debuginfo\", rpm:\"mysql-debuginfo~5.0.45~7.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.0.45~7.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.0.45~7.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.0.45~7.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-01-17T14:46:46", "description": "This update provides fixes for :\n\n - remote triggerable crash. (CVE-2007-3780)\n\n - query tables without propper authorisation.\n (CVE-2007-3781)\n\n - gain update privileges without propper authorisation.\n (CVE-2007-3782)", "edition": 22, "published": "2007-12-13T00:00:00", "title": "SuSE 10 Security Update : MySQL (ZYPP Patch Number 4376)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3780", "CVE-2007-3781", "CVE-2007-3782"], "modified": "2007-12-13T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_MYSQL-4376.NASL", "href": "https://www.tenable.com/plugins/nessus/29525", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29525);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-3780\", \"CVE-2007-3781\", \"CVE-2007-3782\");\n\n script_name(english:\"SuSE 10 Security Update : MySQL (ZYPP Patch Number 4376)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update provides fixes for :\n\n - remote triggerable crash. (CVE-2007-3780)\n\n - query tables without propper authorisation.\n (CVE-2007-3781)\n\n - gain update privileges without propper authorisation.\n (CVE-2007-3782)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-3780.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-3781.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-3782.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 4376.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(20, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"mysql-5.0.26-12.13\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"mysql-client-5.0.26-12.13\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"mysql-devel-5.0.26-12.13\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"mysql-shared-5.0.26-12.13\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"x86_64\", reference:\"mysql-shared-32bit-5.0.26-12.13\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"mysql-5.0.26-12.13\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"mysql-Max-5.0.26-12.13\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"mysql-client-5.0.26-12.13\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"mysql-devel-5.0.26-12.13\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"mysql-shared-5.0.26-12.13\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"x86_64\", reference:\"mysql-shared-32bit-5.0.26-12.13\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T14:46:45", "description": "This update provides fixes for :\n\n - CVE-2007-3780: remote triggerable crash\n\n - CVE-2007-3781: query tables without propper\n authorisation\n\n - CVE-2007-3782: gain update privileges without propper\n authorisation", "edition": 25, "published": "2007-10-17T00:00:00", "title": "openSUSE 10 Security Update : mysql (mysql-4375)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3780", "CVE-2007-3781", "CVE-2007-3782"], "modified": "2007-10-17T00:00:00", "cpe": ["cpe:/o:novell:opensuse:10.2", "p-cpe:/a:novell:opensuse:mysql-devel", "p-cpe:/a:novell:opensuse:mysql", "p-cpe:/a:novell:opensuse:mysql-client", "p-cpe:/a:novell:opensuse:mysql-shared-32bit", "p-cpe:/a:novell:opensuse:mysql-Max", "p-cpe:/a:novell:opensuse:mysql-shared", "p-cpe:/a:novell:opensuse:mysql-debug", "cpe:/o:novell:opensuse:10.1", "p-cpe:/a:novell:opensuse:mysql-bench"], "id": "SUSE_MYSQL-4375.NASL", "href": "https://www.tenable.com/plugins/nessus/27359", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update mysql-4375.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27359);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-3780\", \"CVE-2007-3781\", \"CVE-2007-3782\");\n\n script_name(english:\"openSUSE 10 Security Update : mysql (mysql-4375)\");\n script_summary(english:\"Check for the mysql-4375 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update provides fixes for :\n\n - CVE-2007-3780: remote triggerable crash\n\n - CVE-2007-3781: query tables without propper\n authorisation\n\n - CVE-2007-3782: gain update privileges without propper\n authorisation\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mysql packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(20, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-Max\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-shared\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-shared-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1|SUSE10\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1 / 10.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"mysql-5.0.26-12.13\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"mysql-Max-5.0.26-12.13\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"mysql-bench-5.0.26-12.13\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"mysql-client-5.0.26-12.13\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"mysql-devel-5.0.26-12.13\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"mysql-shared-5.0.26-12.13\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", cpu:\"x86_64\", reference:\"mysql-shared-32bit-5.0.26-12.13\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"mysql-5.0.26-14\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"mysql-Max-5.0.26-14\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"mysql-bench-5.0.26-14\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"mysql-client-5.0.26-14\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"mysql-debug-5.0.26-14\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"mysql-devel-5.0.26-14\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"mysql-shared-5.0.26-14\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", cpu:\"x86_64\", reference:\"mysql-shared-32bit-5.0.26-14\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-03-01T04:14:37", "description": "The version of MySQL Community Server installed on the remote host\nis reportedly affected by a denial of service vulnerability that can\nlead to a server crash with a specially crafted password packet. \n\nIt is also affected by a privilege escalation vulnerability because\n'CREATE TABLE LIKE' does not require any privileges on the source\ntable, which allows an attacker to create arbitrary tables using the\naffected application.", "edition": 28, "published": "2007-07-25T00:00:00", "title": "MySQL Community Server 5.0 < 5.0.45 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3780", "CVE-2007-3781", "CVE-2007-3782"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:mysql:mysql"], "id": "MYSQL_5_0_45.NASL", "href": "https://www.tenable.com/plugins/nessus/25759", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(25759);\n script_version(\"1.22\");\n script_cvs_date(\"Date: 2018/07/16 14:09:13\");\n\n script_cve_id(\"CVE-2007-3780\", \"CVE-2007-3781\", \"CVE-2007-3782\");\n script_bugtraq_id(25017);\n\n script_name(english:\"MySQL Community Server 5.0 < 5.0.45 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of MySQL Community Server\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote database server is susceptible to multiple attacks.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of MySQL Community Server installed on the remote host\nis reportedly affected by a denial of service vulnerability that can\nlead to a server crash with a specially crafted password packet. \n\nIt is also affected by a privilege escalation vulnerability because\n'CREATE TABLE LIKE' does not require any privileges on the source\ntable, which allows an attacker to create arbitrary tables using the\naffected application.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-45.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to MySQL Community Server version 5.0.45 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 264);\n\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/07/25\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/01/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mysql:mysql\");\n script_end_attributes();\n \n script_category(ACT_GATHER_INFO);\n script_family(english:\"Databases\");\n\n script_copyright(english:\"This script is Copyright (C) 2007-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mysql_version.nasl\", \"mysql_login.nasl\");\n script_require_ports(\"Services/mysql\", 3306);\n script_require_keys(\"Settings/ParanoidReport\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"mysql_func.inc\");\n\n\n# nb: banner checks of open source software are prone to false-\n# positives so only run the check if reporting is paranoid.\nif (report_paranoia < 2)\n exit(1, \"This plugin only runs if 'Report paranoia' is set to 'Paranoid'.\");\n\nport = get_service(svc:\"mysql\", default:3306, exit_on_fail:TRUE);\n\nif (mysql_init(port:port, exit_on_fail:TRUE) == 1)\n{\n variant = mysql_get_variant();\n ver = mysql_get_version();\n\n if (\"Community\" >< variant && ver =~ \"^5\\.0\\.([0-9]|[1-3][0-9]|4[0-4])($|[^0-9])\")\n {\n report = '\\nThe remote MySQL Community Server\\'s version is :\\n\\n '+ver+'\\n';\n datadir = get_kb_item('mysql/' + port + '/datadir');\n if (!empty_or_null(datadir))\n {\n report += ' Data Dir : ' + datadir + '\\n';\n }\n databases = get_kb_item('mysql/' + port + '/databases');\n if (!empty_or_null(databases))\n { \n report += ' Databases :\\n' + databases;\n }\n security_warning(port:port, extra:report);\n }\n}\nmysql_close();\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-20T15:44:05", "description": "Neil Kettle discovered that MySQL could be made to dereference a NULL\npointer and divide by zero. An authenticated user could exploit this\nwith a crafted IF clause, leading to a denial of service.\n(CVE-2007-2583)\n\nVictoria Reznichenko discovered that MySQL did not always require the\nDROP privilege. An authenticated user could exploit this via RENAME\nTABLE statements to rename arbitrary tables, possibly gaining\nadditional database access. (CVE-2007-2691)\n\nIt was discovered that MySQL could be made to overflow a signed char\nduring authentication. Remote attackers could use crafted\nauthentication requests to cause a denial of service. (CVE-2007-3780)\n\nPhil Anderton discovered that MySQL did not properly verify access\nprivileges when accessing external tables. As a result, authenticated\nusers could exploit this to obtain UPDATE privileges to external\ntables. (CVE-2007-3782)\n\nIn certain situations, when installing or upgrading mysql, there was\nno notification that the mysql root user password needed to be set. If\nthe password was left unset, attackers would be able to obtain\nunrestricted access to mysql. This is now checked during mysql\nstart-up.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "published": "2007-11-10T00:00:00", "title": "Ubuntu 6.06 LTS / 6.10 / 7.04 : mysql-dfsg-5.0 vulnerabilities (USN-528-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-2583", "CVE-2007-3780", "CVE-2007-3782", "CVE-2007-2691"], "modified": "2007-11-10T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libmysqlclient15off", "p-cpe:/a:canonical:ubuntu_linux:libmysqlclient15-dev", "p-cpe:/a:canonical:ubuntu_linux:mysql-server", "cpe:/o:canonical:ubuntu_linux:6.10", "p-cpe:/a:canonical:ubuntu_linux:mysql-client", "p-cpe:/a:canonical:ubuntu_linux:mysql-client-5.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-4.1", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-common", "cpe:/o:canonical:ubuntu_linux:7.04", "cpe:/o:canonical:ubuntu_linux:6.06:-:lts"], "id": "UBUNTU_USN-528-1.NASL", "href": "https://www.tenable.com/plugins/nessus/28133", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-528-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(28133);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2007-2583\", \"CVE-2007-2691\", \"CVE-2007-3780\", \"CVE-2007-3782\");\n script_bugtraq_id(23911, 24016, 25017);\n script_xref(name:\"USN\", value:\"528-1\");\n\n script_name(english:\"Ubuntu 6.06 LTS / 6.10 / 7.04 : mysql-dfsg-5.0 vulnerabilities (USN-528-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Neil Kettle discovered that MySQL could be made to dereference a NULL\npointer and divide by zero. An authenticated user could exploit this\nwith a crafted IF clause, leading to a denial of service.\n(CVE-2007-2583)\n\nVictoria Reznichenko discovered that MySQL did not always require the\nDROP privilege. An authenticated user could exploit this via RENAME\nTABLE statements to rename arbitrary tables, possibly gaining\nadditional database access. (CVE-2007-2691)\n\nIt was discovered that MySQL could be made to overflow a signed char\nduring authentication. Remote attackers could use crafted\nauthentication requests to cause a denial of service. (CVE-2007-3780)\n\nPhil Anderton discovered that MySQL did not properly verify access\nprivileges when accessing external tables. As a result, authenticated\nusers could exploit this to obtain UPDATE privileges to external\ntables. (CVE-2007-3782)\n\nIn certain situations, when installing or upgrading mysql, there was\nno notification that the mysql root user password needed to be set. If\nthe password was left unset, attackers would be able to obtain\nunrestricted access to mysql. This is now checked during mysql\nstart-up.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/528-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 189, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient15-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient15off\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-4.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.04\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/10/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/11/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(6\\.06|6\\.10|7\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.06 / 6.10 / 7.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libmysqlclient15-dev\", pkgver:\"5.0.22-0ubuntu6.06.5\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libmysqlclient15off\", pkgver:\"5.0.22-0ubuntu6.06.5\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mysql-client\", pkgver:\"5.0.22-0ubuntu6.06.5\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mysql-client-5.0\", pkgver:\"5.0.22-0ubuntu6.06.5\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mysql-common\", pkgver:\"5.0.22-0ubuntu6.06.5\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mysql-server\", pkgver:\"5.0.22-0ubuntu6.06.5\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mysql-server-5.0\", pkgver:\"5.0.22-0ubuntu6.06.5\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libmysqlclient15-dev\", pkgver:\"5.0.24a-9ubuntu2.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libmysqlclient15off\", pkgver:\"5.0.24a-9ubuntu2.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"mysql-client\", pkgver:\"5.0.24a-9ubuntu2.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"mysql-client-5.0\", pkgver:\"5.0.24a-9ubuntu2.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"mysql-common\", pkgver:\"5.0.24a-9ubuntu2.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"mysql-server\", pkgver:\"5.0.24a-9ubuntu2.1\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"mysql-server-5.0\", pkgver:\"5.0.24a-9ubuntu2.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libmysqlclient15-dev\", pkgver:\"5.0.38-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libmysqlclient15off\", pkgver:\"5.0.38-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"mysql-client\", pkgver:\"5.0.38-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"mysql-client-5.0\", pkgver:\"5.0.38-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"mysql-common\", pkgver:\"5.0.38-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"mysql-server\", pkgver:\"5.0.38-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"mysql-server-4.1\", pkgver:\"5.0.38-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"mysql-server-5.0\", pkgver:\"5.0.38-0ubuntu1.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libmysqlclient15-dev / libmysqlclient15off / mysql-client / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T11:51:45", "description": "A vulnerability was found in MySQL's authentication protocol, making\nit possible for a remote unauthenticated attacker to send a specially\ncrafted authentication request to the MySQL server causing it to crash\n(CVE-2007-3780).\n\nAnother flaw was discovered in MySQL that allowed remote authenticated\nusers to gain update privileges for a table in another database via a\nview that refers to the external table (CVE-2007-3782).\n\nUpdated packages have been patched to prevent these issues.", "edition": 26, "published": "2007-09-07T00:00:00", "title": "Mandrake Linux Security Advisory : MySQL (MDKSA-2007:177)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3780", "CVE-2007-3782", "CVE-2007-2692", "CVE-2007-2691"], "modified": "2007-09-07T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:MySQL-common", "p-cpe:/a:mandriva:linux:MySQL-bench", "cpe:/o:mandriva:linux:2007", "p-cpe:/a:mandriva:linux:lib64mysql15-static-devel", "p-cpe:/a:mandriva:linux:MySQL-Max", "p-cpe:/a:mandriva:linux:MySQL-ndb-storage", "p-cpe:/a:mandriva:linux:lib64mysql15", "cpe:/o:mandriva:linux:2007.1", "p-cpe:/a:mandriva:linux:MySQL-ndb-management", "p-cpe:/a:mandriva:linux:MySQL-ndb-tools", "p-cpe:/a:mandriva:linux:MySQL-client", "p-cpe:/a:mandriva:linux:libmysql15-devel", "p-cpe:/a:mandriva:linux:lib64mysql15-devel", "p-cpe:/a:mandriva:linux:MySQL-ndb-extra", "p-cpe:/a:mandriva:linux:MySQL", "p-cpe:/a:mandriva:linux:libmysql15-static-devel", "p-cpe:/a:mandriva:linux:libmysql15"], "id": "MANDRAKE_MDKSA-2007-177.NASL", "href": "https://www.tenable.com/plugins/nessus/26009", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2007:177. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(26009);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-2691\", \"CVE-2007-2692\", \"CVE-2007-3780\", \"CVE-2007-3782\");\n script_xref(name:\"MDKSA\", value:\"2007:177\");\n\n script_name(english:\"Mandrake Linux Security Advisory : MySQL (MDKSA-2007:177)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability was found in MySQL's authentication protocol, making\nit possible for a remote unauthenticated attacker to send a specially\ncrafted authentication request to the MySQL server causing it to crash\n(CVE-2007-3780).\n\nAnother flaw was discovered in MySQL that allowed remote authenticated\nusers to gain update privileges for a table in another database via a\nview that refers to the external table (CVE-2007-3782).\n\nUpdated packages have been patched to prevent these issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P\");\n script_cwe_id(20, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:MySQL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:MySQL-Max\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:MySQL-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:MySQL-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:MySQL-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:MySQL-ndb-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:MySQL-ndb-management\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:MySQL-ndb-storage\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:MySQL-ndb-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64mysql15\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64mysql15-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64mysql15-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libmysql15\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libmysql15-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libmysql15-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2007\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2007.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/09/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2007.0\", reference:\"MySQL-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"MySQL-Max-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"MySQL-bench-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"MySQL-client-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"MySQL-common-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"MySQL-ndb-extra-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"MySQL-ndb-management-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"MySQL-ndb-storage-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"MySQL-ndb-tools-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64mysql15-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64mysql15-devel-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64mysql15-static-devel-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libmysql15-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libmysql15-devel-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libmysql15-static-devel-5.0.24a-2.2mdv2007.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2007.1\", reference:\"MySQL-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"MySQL-Max-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"MySQL-bench-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"MySQL-client-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"MySQL-common-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"MySQL-ndb-extra-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"MySQL-ndb-management-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"MySQL-ndb-storage-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"MySQL-ndb-tools-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64mysql15-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64mysql15-devel-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64mysql15-static-devel-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libmysql15-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libmysql15-devel-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libmysql15-static-devel-5.0.37-2.2mdv2007.1\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T09:44:52", "description": "Several vulnerabilities have been found in the MySQL database packages\nwith implications ranging from unauthorized database modifications to\nremotely triggered server crashes. The Common Vulnerabilities and\nExposures project identifies the following problems :\n\n - CVE-2007-2583\n The in_decimal::set function in item_cmpfunc.cc in MySQL\n before 5.0.40 allows context-dependent attackers to\n cause a denial of service (crash) via a crafted IF\n clause that results in a divide-by-zero error and a NULL\n pointer dereference. (Affects source version 5.0.32.)\n\n - CVE-2007-2691\n MySQL does not require the DROP privilege for RENAME\n TABLE statements, which allows remote authenticated\n users to rename arbitrary tables. (All supported\n versions affected.)\n\n - CVE-2007-2692\n The mysql_change_db function does not restore\n THD::db_access privileges when returning from SQL\n SECURITY INVOKER stored routines, which allows remote\n authenticated users to gain privileges. (Affects source\n version 5.0.32.)\n\n - CVE-2007-3780\n MySQL could be made to overflow a signed char during\n authentication. Remote attackers could use specially\n crafted authentication requests to cause a denial of\n service. (Upstream source versions 4.1.11a and 5.0.32\n affected.)\n\n - CVE-2007-3782\n Phil Anderton discovered that MySQL did not properly\n verify access privileges when accessing external tables.\n As a result, authenticated users could exploit this to\n obtain UPDATE privileges to external tables. (Affects\n source version 5.0.32.)\n\n - CVE-2007-5925\n The convert_search_mode_to_innobase function in\n ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and\n earlier allows remote authenticated users to cause a\n denial of service (database crash) via a certain\n CONTAINS operation on an indexed column, which triggers\n an assertion error. (Affects source version 5.0.32.)", "edition": 28, "published": "2007-11-29T00:00:00", "title": "Debian DSA-1413-1 : mysql - multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-2583", "CVE-2007-3780", "CVE-2007-5925", "CVE-2007-3782", "CVE-2007-2692", "CVE-2007-2691"], "modified": "2007-11-29T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:mysql-dfsg-4.1", "cpe:/o:debian:debian_linux:4.0", "cpe:/o:debian:debian_linux:3.1", "p-cpe:/a:debian:debian_linux:mysql-dfsg", "p-cpe:/a:debian:debian_linux:mysql-dfsg-5.0"], "id": "DEBIAN_DSA-1413.NASL", "href": "https://www.tenable.com/plugins/nessus/28336", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1413. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(28336);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2007-2583\", \"CVE-2007-2691\", \"CVE-2007-2692\", \"CVE-2007-5925\");\n script_xref(name:\"DSA\", value:\"1413\");\n\n script_name(english:\"Debian DSA-1413-1 : mysql - multiple vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been found in the MySQL database packages\nwith implications ranging from unauthorized database modifications to\nremotely triggered server crashes. The Common Vulnerabilities and\nExposures project identifies the following problems :\n\n - CVE-2007-2583\n The in_decimal::set function in item_cmpfunc.cc in MySQL\n before 5.0.40 allows context-dependent attackers to\n cause a denial of service (crash) via a crafted IF\n clause that results in a divide-by-zero error and a NULL\n pointer dereference. (Affects source version 5.0.32.)\n\n - CVE-2007-2691\n MySQL does not require the DROP privilege for RENAME\n TABLE statements, which allows remote authenticated\n users to rename arbitrary tables. (All supported\n versions affected.)\n\n - CVE-2007-2692\n The mysql_change_db function does not restore\n THD::db_access privileges when returning from SQL\n SECURITY INVOKER stored routines, which allows remote\n authenticated users to gain privileges. (Affects source\n version 5.0.32.)\n\n - CVE-2007-3780\n MySQL could be made to overflow a signed char during\n authentication. Remote attackers could use specially\n crafted authentication requests to cause a denial of\n service. (Upstream source versions 4.1.11a and 5.0.32\n affected.)\n\n - CVE-2007-3782\n Phil Anderton discovered that MySQL did not properly\n verify access privileges when accessing external tables.\n As a result, authenticated users could exploit this to\n obtain UPDATE privileges to external tables. (Affects\n source version 5.0.32.)\n\n - CVE-2007-5925\n The convert_search_mode_to_innobase function in\n ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and\n earlier allows remote authenticated users to cause a\n denial of service (database crash) via a certain\n CONTAINS operation on an indexed column, which triggers\n an assertion error. (Affects source version 5.0.32.)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426353\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=424778\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=424778\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=451235\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-2583\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-2691\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-2692\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-3780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-3782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-5925\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2007/dsa-1413\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the mysql packages.\n\nFor the old stable distribution (sarge), these problems have been\nfixed in version 4.0.24-10sarge3 of mysql-dfsg and version\n4.1.11a-4sarge8 of mysql-dfsg-4.1.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 5.0.32-7etch3 of the mysql-dfsg-5.0 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P\");\n script_cwe_id(20, 189);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:mysql-dfsg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:mysql-dfsg-4.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:mysql-dfsg-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:4.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/11/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/11/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"libmysqlclient12\", reference:\"4.0.24-10sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libmysqlclient12-dev\", reference:\"4.0.24-10sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libmysqlclient14\", reference:\"4.1.11a-4sarge8\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libmysqlclient14-dev\", reference:\"4.1.11a-4sarge8\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mysql-client\", reference:\"4.0.24-10sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mysql-client-4.1\", reference:\"4.1.11a-4sarge8\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mysql-common\", reference:\"4.0.24-10sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mysql-common-4.1\", reference:\"4.1.11a-4sarge8\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mysql-server\", reference:\"4.0.24-10sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mysql-server-4.1\", reference:\"4.1.11a-4sarge8\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libmysqlclient15-dev\", reference:\"5.0.32-7etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libmysqlclient15off\", reference:\"5.0.32-7etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"mysql-client\", reference:\"5.0.32-7etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"mysql-client-5.0\", reference:\"5.0.32-7etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"mysql-common\", reference:\"5.0.32-7etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"mysql-server\", reference:\"5.0.32-7etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"mysql-server-4.1\", reference:\"5.0.32-7etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"mysql-server-5.0\", reference:\"5.0.32-7etch3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T13:43:45", "description": "A flaw was discovered in MySQL's authentication protocol. It is\npossible for a remote unauthenticated attacker to send a specially\ncrafted authentication request to the MySQL server causing it to\ncrash. (CVE-2007-3780)", "edition": 25, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : mysql on SL5.x, SL4.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3780"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20070830_MYSQL_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60243", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60243);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-3780\");\n\n script_name(english:\"Scientific Linux Security Update : mysql on SL5.x, SL4.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was discovered in MySQL's authentication protocol. It is\npossible for a remote unauthenticated attacker to send a specially\ncrafted authentication request to the MySQL server causing it to\ncrash. (CVE-2007-3780)\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0708&L=scientific-linux-errata&T=0&P=909\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0c385f44\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/08/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL4\", reference:\"mysql-4.1.20-2.RHEL4.1.0.1\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"mysql-bench-4.1.20-2.RHEL4.1.0.1\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"mysql-devel-4.1.20-2.RHEL4.1.0.1\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"mysql-server-4.1.20-2.RHEL4.1.0.1\")) flag++;\n\nif (rpm_check(release:\"SL5\", reference:\"mysql-5.0.22-2.1.0.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"mysql-bench-5.0.22-2.1.0.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"mysql-devel-5.0.22-2.1.0.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"mysql-server-5.0.22-2.1.0.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"mysql-test-5.0.22-2.1.0.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T13:05:53", "description": "Updated mysql packages that fix a security flaw are now available for\nRed Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nMySQL is a multi-user, multi-threaded SQL database server. MySQL is a\nclient/server implementation consisting of a server daemon (mysqld)\nand many different client programs and libraries.\n\nA flaw was discovered in MySQL's authentication protocol. It is\npossible for a remote unauthenticated attacker to send a specially\ncrafted authentication request to the MySQL server causing it to\ncrash. (CVE-2007-3780)\n\nAll users of the MySQL server are advised to upgrade to these updated\npackages, which contain a backported patch which fixes this issue.", "edition": 28, "published": "2007-09-03T00:00:00", "title": "RHEL 4 / 5 : mysql (RHSA-2007:0875)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3780"], "modified": "2007-09-03T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:4", "cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:mysql-bench", "p-cpe:/a:redhat:enterprise_linux:mysql-devel", "p-cpe:/a:redhat:enterprise_linux:mysql-server", "p-cpe:/a:redhat:enterprise_linux:mysql-test", "cpe:/o:redhat:enterprise_linux:4.5", "p-cpe:/a:redhat:enterprise_linux:mysql"], "id": "REDHAT-RHSA-2007-0875.NASL", "href": "https://www.tenable.com/plugins/nessus/25970", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2007:0875. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(25970);\n script_version(\"1.26\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-3780\");\n script_bugtraq_id(25017);\n script_xref(name:\"RHSA\", value:\"2007:0875\");\n\n script_name(english:\"RHEL 4 / 5 : mysql (RHSA-2007:0875)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated mysql packages that fix a security flaw are now available for\nRed Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nMySQL is a multi-user, multi-threaded SQL database server. MySQL is a\nclient/server implementation consisting of a server daemon (mysqld)\nand many different client programs and libraries.\n\nA flaw was discovered in MySQL's authentication protocol. It is\npossible for a remote unauthenticated attacker to send a specially\ncrafted authentication request to the MySQL server causing it to\ncrash. (CVE-2007-3780)\n\nAll users of the MySQL server are advised to upgrade to these updated\npackages, which contain a backported patch which fixes this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2007-3780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2007:0875\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/07/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/08/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/09/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x / 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2007:0875\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"mysql-4.1.20-2.RHEL4.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"mysql-bench-4.1.20-2.RHEL4.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"mysql-devel-4.1.20-2.RHEL4.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"mysql-server-4.1.20-2.RHEL4.1.0.1\")) flag++;\n\n\n if (rpm_check(release:\"RHEL5\", reference:\"mysql-5.0.22-2.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"mysql-bench-5.0.22-2.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"mysql-bench-5.0.22-2.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"mysql-bench-5.0.22-2.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"mysql-devel-5.0.22-2.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"mysql-server-5.0.22-2.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"mysql-server-5.0.22-2.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"mysql-server-5.0.22-2.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"mysql-test-5.0.22-2.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"mysql-test-5.0.22-2.1.0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"mysql-test-5.0.22-2.1.0.1\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-devel / mysql-server / mysql-test\");\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T12:44:02", "description": "From Red Hat Security Advisory 2007:0875 :\n\nUpdated mysql packages that fix a security flaw are now available for\nRed Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nMySQL is a multi-user, multi-threaded SQL database server. MySQL is a\nclient/server implementation consisting of a server daemon (mysqld)\nand many different client programs and libraries.\n\nA flaw was discovered in MySQL's authentication protocol. It is\npossible for a remote unauthenticated attacker to send a specially\ncrafted authentication request to the MySQL server causing it to\ncrash. (CVE-2007-3780)\n\nAll users of the MySQL server are advised to upgrade to these updated\npackages, which contain a backported patch which fixes this issue.", "edition": 25, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 4 / 5 : mysql (ELSA-2007-0875)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3780"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:mysql", "p-cpe:/a:oracle:linux:mysql-devel", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:mysql-bench", "p-cpe:/a:oracle:linux:mysql-test", "cpe:/o:oracle:linux:4", "p-cpe:/a:oracle:linux:mysql-server"], "id": "ORACLELINUX_ELSA-2007-0875.NASL", "href": "https://www.tenable.com/plugins/nessus/67566", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2007:0875 and \n# Oracle Linux Security Advisory ELSA-2007-0875 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67566);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-3780\");\n script_bugtraq_id(25017);\n script_xref(name:\"RHSA\", value:\"2007:0875\");\n\n script_name(english:\"Oracle Linux 4 / 5 : mysql (ELSA-2007-0875)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2007:0875 :\n\nUpdated mysql packages that fix a security flaw are now available for\nRed Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nMySQL is a multi-user, multi-threaded SQL database server. MySQL is a\nclient/server implementation consisting of a server daemon (mysqld)\nand many different client programs and libraries.\n\nA flaw was discovered in MySQL's authentication protocol. It is\npossible for a remote unauthenticated attacker to send a specially\ncrafted authentication request to the MySQL server causing it to\ncrash. (CVE-2007-3780)\n\nAll users of the MySQL server are advised to upgrade to these updated\npackages, which contain a backported patch which fixes this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2007-August/000310.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2007-August/000311.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mysql packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/07/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/08/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 4 / 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"mysql-4.1.20-2.RHEL4.1.0.1\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"mysql-4.1.20-2.RHEL4.1.0.1\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"mysql-bench-4.1.20-2.RHEL4.1.0.1\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"mysql-bench-4.1.20-2.RHEL4.1.0.1\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"mysql-devel-4.1.20-2.RHEL4.1.0.1\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"mysql-devel-4.1.20-2.RHEL4.1.0.1\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"mysql-server-4.1.20-2.RHEL4.1.0.1\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"mysql-server-4.1.20-2.RHEL4.1.0.1\")) flag++;\n\nif (rpm_check(release:\"EL5\", reference:\"mysql-5.0.22-2.1.0.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"mysql-bench-5.0.22-2.1.0.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"mysql-devel-5.0.22-2.1.0.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"mysql-server-5.0.22-2.1.0.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"mysql-test-5.0.22-2.1.0.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-devel / mysql-server / mysql-test\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T10:40:39", "description": "MySQL reports :\n\nA malformed password packet in the connection protocol could cause the\nserver to crash.", "edition": 25, "published": "2009-01-12T00:00:00", "title": "FreeBSD : mysql -- remote dos via malformed password packet (240ac24c-dff3-11dd-a765-0030843d3802)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3780"], "modified": "2009-01-12T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:mysql-server", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_240AC24CDFF311DDA7650030843D3802.NASL", "href": "https://www.tenable.com/plugins/nessus/35335", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(35335);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-3780\");\n script_bugtraq_id(25017);\n\n script_name(english:\"FreeBSD : mysql -- remote dos via malformed password packet (240ac24c-dff3-11dd-a765-0030843d3802)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"MySQL reports :\n\nA malformed password packet in the connection protocol could cause the\nserver to crash.\"\n );\n # http://bugs.mysql.com/bug.php?id=28984\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=28984\"\n );\n # https://vuxml.freebsd.org/freebsd/240ac24c-dff3-11dd-a765-0030843d3802.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4d8f95a9\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/07/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/01/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/01/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"mysql-server>=4.1<4.1.24\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mysql-server>=5.0<5.0.44\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mysql-server>=5.1<5.1.20\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "ubuntu": [{"lastseen": "2020-07-09T00:28:16", "bulletinFamily": "unix", "cvelist": ["CVE-2007-2583", "CVE-2007-3780", "CVE-2007-3782", "CVE-2007-2691"], "description": "Neil Kettle discovered that MySQL could be made to dereference a NULL \npointer and divide by zero. An authenticated user could exploit this \nwith a crafted IF clause, leading to a denial of service. (CVE-2007-2583)\n\nVictoria Reznichenko discovered that MySQL did not always require the \nDROP privilege. An authenticated user could exploit this via RENAME \nTABLE statements to rename arbitrary tables, possibly gaining additional \ndatabase access. (CVE-2007-2691)\n\nIt was discovered that MySQL could be made to overflow a signed char \nduring authentication. Remote attackers could use crafted authentication \nrequests to cause a denial of service. (CVE-2007-3780)\n\nPhil Anderton discovered that MySQL did not properly verify access \nprivileges when accessing external tables. As a result, authenticated \nusers could exploit this to obtain UPDATE privileges to external \ntables. (CVE-2007-3782)\n\nIn certain situations, when installing or upgrading mysql, there was no \nnotification that the mysql root user password needed to be set. If the \npassword was left unset, attackers would be able to obtain unrestricted \naccess to mysql. This is now checked during mysql start-up.", "edition": 5, "modified": "2007-10-11T00:00:00", "published": "2007-10-11T00:00:00", "id": "USN-528-1", "href": "https://ubuntu.com/security/notices/USN-528-1", "title": "MySQL vulnerabilities", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:23", "bulletinFamily": "software", "cvelist": ["CVE-2007-2583", "CVE-2007-3780", "CVE-2007-3782", "CVE-2007-2691"], "description": "=========================================================== \r\nUbuntu Security Notice USN-528-1 October 11, 2007\r\nmysql-dfsg-5.0 vulnerabilities\r\nCVE-2007-2583, CVE-2007-2691, CVE-2007-3780, CVE-2007-3782\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 6.06 LTS\r\nUbuntu 6.10\r\nUbuntu 7.04\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 6.06 LTS:\r\n mysql-server-5.0 5.0.22-0ubuntu6.06.5\r\n\r\nUbuntu 6.10:\r\n mysql-server-5.0 5.0.24a-9ubuntu2.1\r\n\r\nUbuntu 7.04:\r\n mysql-server-5.0 5.0.38-0ubuntu1.1\r\n\r\nIn general, a standard system upgrade is sufficient to affect the\r\nnecessary changes.\r\n\r\nATTENTION: A change was made to the init script for mysql. Now on\r\nstart-up, mysql is checked to make sure that the mysql root password is\r\nset. If it is blank, a message is sent to the console and the system\r\nlogger alerting that the password is not set, along with instructions\r\non how to set it. Additionally, you can now use:\r\n\r\n sudo /etc/init.d/mysql reset-password\r\n\r\nto set the root mysql user's password.\r\n\r\nDetails follow:\r\n\r\nNeil Kettle discovered that MySQL could be made to dereference a NULL\r\npointer and divide by zero. An authenticated user could exploit this\r\nwith a crafted IF clause, leading to a denial of service. (CVE-2007-2583)\r\n\r\nVictoria Reznichenko discovered that MySQL did not always require the\r\nDROP privilege. An authenticated user could exploit this via RENAME\r\nTABLE statements to rename arbitrary tables, possibly gaining additional\r\ndatabase access. (CVE-2007-2691)\r\n\r\nIt was discovered that MySQL could be made to overflow a signed char\r\nduring authentication. Remote attackers could use crafted authentication\r\nrequests to cause a denial of service. (CVE-2007-3780)\r\n\r\nPhil Anderton discovered that MySQL did not properly verify access\r\nprivileges when accessing external tables. As a result, authenticated\r\nusers could exploit this to obtain UPDATE privileges to external\r\ntables. (CVE-2007-3782)\r\n\r\nIn certain situations, when installing or upgrading mysql, there was no\r\nnotification that the mysql root user password needed to be set. If the\r\npassword was left unset, attackers would be able to obtain unrestricted\r\naccess to mysql. This is now checked during mysql start-up.\r\n\r\n\r\nUpdated packages for Ubuntu 6.06 LTS:\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.5.diff.gz\r\n Size/MD5: 136815 2ee9310c1637f93e11018eb97f9869be\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.5.dsc\r\n Size/MD5: 1107 ab778bf06352edb36a0fa19284f2288b\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22.orig.tar.gz\r\n Size/MD5: 18446645 2b8f36364373461190126817ec872031\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.5_all.deb\r\n Size/MD5: 37388 275b38cbafa4304811a6f2127924a0f6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.5_all.deb\r\n Size/MD5: 39892 c5167fd4319f83879893c836436050f9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.5_all.deb\r\n Size/MD5: 37398 1ee71fa600d8408997ce89bdc4b9f7c6\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.5_amd64.deb\r\n Size/MD5: 6726370 4e4070345c2bce927957ecbc13d3e374\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.5_amd64.deb\r\n Size/MD5: 1422286 10e53e36a0688870a82291a3edb5339e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.5_amd64.deb\r\n Size/MD5: 6895754 de1ce4dc0415f7d098c2d20615307ec1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.5_amd64.deb\r\n Size/MD5: 22490856 28c02acdf90f9f90792a356831af52cc\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.5_i386.deb\r\n Size/MD5: 6140062 dd3ac2c52870c087fe219f0fbeb2f752\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.5_i386.deb\r\n Size/MD5: 1382756 ba60b2fcd47aebab479f0142ffab7d61\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.5_i386.deb\r\n Size/MD5: 6278314 5cbc3b700a9f93e0e4f5fbb3aed135cb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.5_i386.deb\r\n Size/MD5: 21348936 36e9d8b906f5d9e74234f834d63f7f9d\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.5_powerpc.deb\r\n Size/MD5: 6883652 4f5f003ab2fb4e801c7b55c9e04e1fb0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.5_powerpc.deb\r\n Size/MD5: 1462642 a66d382783bedbf4c2ad57f1b763d4a2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.5_powerpc.deb\r\n Size/MD5: 6940358 00d98f99e72e2300ca62fa60f6197502\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.5_powerpc.deb\r\n Size/MD5: 22704382 07d7feaed935ee0542589c35508b20d4\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.5_sparc.deb\r\n Size/MD5: 6431340 89f75bfa3afa604853fafe212e6595cf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.5_sparc.deb\r\n Size/MD5: 1434724 b9058a1caad8d21d875bc75f9f8d60b1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.5_sparc.deb\r\n Size/MD5: 6536152 f3fd415edaed579a14437c4ee5ed89de\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.5_sparc.deb\r\n Size/MD5: 21970112 2236df1c10fd9f8c3186538930ba7d76\r\n\r\nUpdated packages for Ubuntu 6.10:\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.24a-9ubuntu2.1.diff.gz\r\n Size/MD5: 144500 1b7a672d9776990ff2d877db496c840e\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.24a-9ubuntu2.1.dsc\r\n Size/MD5: 1103 e42e629b8347840d1208d090b0df0107\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.24a.orig.tar.gz\r\n Size/MD5: 18663598 9641fcc4f34b4a2651d1aabb3b72a971\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.24a-9ubuntu2.1_all.deb\r\n Size/MD5: 40008 03d5a2539703b0a8dc4b820935475ebb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.24a-9ubuntu2.1_all.deb\r\n Size/MD5: 42636 92d63cd292c7b8109b2af60b7a47e3c6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.24a-9ubuntu2.1_all.deb\r\n Size/MD5: 40010 38c38470a3aab199585defbd179bb925\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.24a-9ubuntu2.1_amd64.deb\r\n Size/MD5: 7293618 cbeefb8354a5c22b8fde0e5e422999ec\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.24a-9ubuntu2.1_amd64.deb\r\n Size/MD5: 1815054 02cb8e56c67d2f26068e883ea94e948a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.24a-9ubuntu2.1_amd64.deb\r\n Size/MD5: 7432812 0ebf5066c4e9015239801f46df0347bd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.24a-9ubuntu2.1_amd64.deb\r\n Size/MD5: 25706206 f863864c4a259f7114b182f5d9ccf5a1\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.24a-9ubuntu2.1_i386.deb\r\n Size/MD5: 6812954 4d2a81c4039273d83b031f601e68e297\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.24a-9ubuntu2.1_i386.deb\r\n Size/MD5: 1760350 dabac2c1945048eb89ea960637532f10\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.24a-9ubuntu2.1_i386.deb\r\n Size/MD5: 6955736 3da01222cb928829475ebcb538b363af\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.24a-9ubuntu2.1_i386.deb\r\n Size/MD5: 24937436 90182b36491b66d62e24a804634bb570\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.24a-9ubuntu2.1_powerpc.deb\r\n Size/MD5: 7435444 ec713d710bd8fb5356ce87e1012f9a4d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.24a-9ubuntu2.1_powerpc.deb\r\n Size/MD5: 1810108 21778248de27b14f6d69774412693a01\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.24a-9ubuntu2.1_powerpc.deb\r\n Size/MD5: 7470568 87fd8065ae2c2a235568a629235b0868\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.24a-9ubuntu2.1_powerpc.deb\r\n Size/MD5: 26070012 2385594643de4ee42c25b3881c92e01c\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.24a-9ubuntu2.1_sparc.deb\r\n Size/MD5: 6942742 ca10a0db660f04ef8dcdb8cafca15ebb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.24a-9ubuntu2.1_sparc.deb\r\n Size/MD5: 1771480 f494d1f1ee05a672d1dbc98797e5b40a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.24a-9ubuntu2.1_sparc.deb\r\n Size/MD5: 7048314 7a1a2cb0578b2d9f294957dec1025e31\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.24a-9ubuntu2.1_sparc.deb\r\n Size/MD5: 25302728 02d905d78fff0c52241d666760652a74\r\n\r\nUpdated packages for Ubuntu 7.04:\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.38-0ubuntu1.1.diff.gz\r\n Size/MD5: 148883 52b584c506693eea79bdf575dbaeabf4\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.38-0ubuntu1.1.dsc\r\n Size/MD5: 1209 1d2d29837f0327bdb007a6f6bb99d458\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.38.orig.tar.gz\r\n Size/MD5: 16602385 c661bce63e01401455c2273bfb170a8d\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.38-0ubuntu1.1_all.deb\r\n Size/MD5: 45752 774b8b1290d6a20b29c2fb1d361c589a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.38-0ubuntu1.1_all.deb\r\n Size/MD5: 54470 7d12190b5ff1b6c544de13b037a60383\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.38-0ubuntu1.1_all.deb\r\n Size/MD5: 47832 58d912a6ac7f2ed72fd10fea3120a054\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.38-0ubuntu1.1_amd64.deb\r\n Size/MD5: 7450360 788e9a7d6effee15327804fd87a509df\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.38-0ubuntu1.1_amd64.deb\r\n Size/MD5: 1891972 2585d88d50347e3eff795e8d050bb9fb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.38-0ubuntu1.1_amd64.deb\r\n Size/MD5: 7850734 339b83fa3a7476fb976cee4c56d6ea0b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.38-0ubuntu1.1_amd64.deb\r\n Size/MD5: 47852 f7f22b793bd9be902e3e3f28bc661028\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.38-0ubuntu1.1_amd64.deb\r\n Size/MD5: 26506454 3479e2d61c01b69c6dc193f3e1418340\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.38-0ubuntu1.1_i386.deb\r\n Size/MD5: 6951826 f38b783bec8bf54762e2af610e2eb27e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.38-0ubuntu1.1_i386.deb\r\n Size/MD5: 1834950 b99e28cdd22943c3001b5a7beb09e7be\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.38-0ubuntu1.1_i386.deb\r\n Size/MD5: 7361004 a8260ee2e9acfa657d318120face8c02\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.38-0ubuntu1.1_i386.deb\r\n Size/MD5: 47854 32e151e1d7dab5ebac33623ffc9e86d8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.38-0ubuntu1.1_i386.deb\r\n Size/MD5: 25740498 eeecc1e7f07e587394924c581f367bd7\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.38-0ubuntu1.1_powerpc.deb\r\n Size/MD5: 7653930 0380fa4c4a075bd51e574c558533d72a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.38-0ubuntu1.1_powerpc.deb\r\n Size/MD5: 1918584 075962f787639cdca6419d6eebfa1324\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.38-0ubuntu1.1_powerpc.deb\r\n Size/MD5: 7912746 02fbc0f2dd01158c776790680c6f9ff2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.38-0ubuntu1.1_powerpc.deb\r\n Size/MD5: 47858 ad466ed4dec1fd6157c52f4e3b5cb6e5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.38-0ubuntu1.1_powerpc.deb\r\n Size/MD5: 26977146 3aa11532c1bd46ea1d820ba870900a90\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.38-0ubuntu1.1_sparc.deb\r\n Size/MD5: 7079614 fb8163f79bc93d0da46f510792630bab\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.38-0ubuntu1.1_sparc.deb\r\n Size/MD5: 1839596 ed3b9b8a8aca9033cb671e1cb0a0708e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.38-0ubuntu1.1_sparc.deb\r\n Size/MD5: 7438302 bc4503ddd8bc44c99cc74c4641725b22\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.38-0ubuntu1.1_sparc.deb\r\n Size/MD5: 47848 68da3bfe606f6480c625e2a8111556e6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.38-0ubuntu1.1_sparc.deb\r\n Size/MD5: 26108400 6965b1264ac2f52c5171360bc26c3277\r\n", "edition": 1, "modified": "2007-10-13T00:00:00", "published": "2007-10-13T00:00:00", "id": "SECURITYVULNS:DOC:18185", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:18185", "title": "bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:27", "bulletinFamily": "software", "cvelist": ["CVE-2007-2583", "CVE-2007-3780", "CVE-2007-3782", "CVE-2007-2691"], "description": "Denial of service, privilege escalation.", "edition": 1, "modified": "2007-10-13T00:00:00", "published": "2007-10-13T00:00:00", "id": "SECURITYVULNS:VULN:8248", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:8248", "title": "MySQL multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:26", "bulletinFamily": "software", "cvelist": ["CVE-2007-3780", "CVE-2007-3781"], "description": "CREATE TABLE LIKE privilege escalation, server crash on authentication.", "edition": 1, "modified": "2007-08-17T00:00:00", "published": "2007-08-17T00:00:00", "id": "SECURITYVULNS:VULN:8064", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:8064", "title": "MySQL multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:23", "bulletinFamily": "software", "cvelist": ["CVE-2007-3780", "CVE-2007-3781"], "description": "- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\r\nGentoo Linux Security Advisory GLSA 200708-10\r\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\r\n http://security.gentoo.org/\r\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\r\n\r\n Severity: Normal\r\n Title: MySQL: Denial of Service and information leakage\r\n Date: August 16, 2007\r\n Bugs: #185333\r\n ID: 200708-10\r\n\r\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\r\n\r\nSynopsis\r\n========\r\n\r\nA Denial of Service vulnerability and a table structure information\r\nleakage vulnerability were found in MySQL.\r\n\r\nBackground\r\n==========\r\n\r\nMySQL is a popular multi-threaded, multi-user SQL server.\r\n\r\nAffected packages\r\n=================\r\n\r\n -------------------------------------------------------------------\r\n Package / Vulnerable / Unaffected\r\n -------------------------------------------------------------------\r\n 1 dev-db/mysql < 5.0.44 >= 5.0.44\r\n\r\nDescription\r\n===========\r\n\r\nDormando reported a vulnerability within the handling of password\r\npackets in the connection protocol (CVE-2007-3780). Andrei Elkin also\r\nfound that the "CREATE TABLE LIKE" command didn't require SELECT\r\nprivileges on the source table (CVE-2007-3781).\r\n\r\nImpact\r\n======\r\n\r\nA remote unauthenticated attacker could use the first vulnerability to\r\nmake the server crash. The second vulnerability can be used by\r\nauthenticated users to obtain information on tables they are not\r\nnormally able to access.\r\n\r\nWorkaround\r\n==========\r\n\r\nThere is no known workaround at this time.\r\n\r\nResolution\r\n==========\r\n\r\nAll MySQL users should upgrade to the latest version:\r\n\r\n # emerge --sync\r\n # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.0.44"\r\n\r\nReferences\r\n==========\r\n\r\n [ 1 ] CVE-2007-3780\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3780\r\n [ 2 ] CVE-2007-3781\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3781\r\n\r\nAvailability\r\n============\r\n\r\nThis GLSA and any updates to it are available for viewing at\r\nthe Gentoo Security Website:\r\n\r\n http://security.gentoo.org/glsa/glsa-200708-10.xml\r\n\r\nConcerns?\r\n=========\r\n\r\nSecurity is a primary focus of Gentoo Linux and ensuring the\r\nconfidentiality and security of our users machines is of utmost\r\nimportance to us. Any security concerns should be addressed to\r\nsecurity@gentoo.org or alternatively, you may file a bug at\r\nhttp://bugs.gentoo.org.\r\n\r\nLicense\r\n=======\r\n\r\nCopyright 2007 Gentoo Foundation, Inc; referenced text\r\nbelongs to its owner(s).\r\n\r\nThe contents of this document are licensed under the\r\nCreative Commons - Attribution / Share Alike license.\r\n\r\nhttp://creativecommons.org/licenses/by-sa/2.5", "edition": 1, "modified": "2007-08-17T00:00:00", "published": "2007-08-17T00:00:00", "id": "SECURITYVULNS:DOC:17827", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:17827", "title": "[ GLSA 200708-10 ] MySQL: Denial of Service and information leakage", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "redhat": [{"lastseen": "2019-08-13T18:46:12", "bulletinFamily": "unix", "cvelist": ["CVE-2007-2691", "CVE-2007-2692", "CVE-2007-3780", "CVE-2007-3781", "CVE-2007-3782"], "description": "On the 23rd August 2007, Red Hat Application Stack v1.2 was released. This\r\nrelease contained a new version of MySQL that corrected several security\r\nissues found in the MySQL packages of Red Hat Application Stack v1.1.\r\n\r\nUsers who have already updated to Red Hat Application Stack v1.2 will\r\nalready have the new MySQL packages and are not affected by these issues.\r\n\r\nA flaw was discovered in MySQL's authentication protocol. A remote\r\nunauthenticated attacker could send a specially crafted authentication\r\nrequest to the MySQL server causing it to crash. (CVE-2007-3780)\r\n\r\nMySQL did not require privileges such as SELECT for the source table in a\r\nCREATE TABLE LIKE statement. A remote authenticated user could obtain\r\nsensitive information such as the table structure. (CVE-2007-3781)\r\n\r\nA flaw was discovered in MySQL that allowed remote authenticated\r\nusers to gain update privileges for a table in another database via a view\r\nthat refers to the external table (CVE-2007-3782).\r\n\r\nA flaw was discovered in the mysql_change_db function when returning from\r\nSQL SECURITY INVOKER stored routines. A remote authenticated user could\r\nuse this flaw to gain database privileges. (CVE-2007-2692)\r\n\r\nMySQL did not require the DROP privilege for RENAME TABLE statements. A\r\nremote authenticated users could use this flaw to rename arbitrary tables.\r\n(CVE-2007-2691)", "modified": "2019-03-22T23:44:16", "published": "2007-09-10T04:00:00", "id": "RHSA-2007:0894", "href": "https://access.redhat.com/errata/RHSA-2007:0894", "type": "redhat", "title": "(RHSA-2007:0894) Important: mysql security update", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:45:28", "bulletinFamily": "unix", "cvelist": ["CVE-2007-3780"], "description": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\r\nclient/server implementation consisting of a server daemon (mysqld) and\r\nmany different client programs and libraries.\r\n\r\nA flaw was discovered in MySQL's authentication protocol. It is possible\r\nfor a remote unauthenticated attacker to send a specially crafted\r\nauthentication request to the MySQL server causing it to crash. (CVE-2007-3780)\r\n\r\nAll users of the MySQL server are advised to upgrade to these updated\r\npackages, which contain a backported patch which fixes this issue.", "modified": "2017-09-08T11:54:08", "published": "2007-08-30T04:00:00", "id": "RHSA-2007:0875", "href": "https://access.redhat.com/errata/RHSA-2007:0875", "type": "redhat", "title": "(RHSA-2007:0875) Important: mysql security update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-08-13T18:47:00", "bulletinFamily": "unix", "cvelist": ["CVE-2006-0903", "CVE-2006-4031", "CVE-2006-4227", "CVE-2006-7232", "CVE-2007-1420", "CVE-2007-2583", "CVE-2007-2691", "CVE-2007-2692", "CVE-2007-3781", "CVE-2007-3782"], "description": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\r\nclient/server implementation consisting of a server daemon (mysqld), and\r\nmany different client programs and libraries.\r\n\r\nMySQL did not require privileges such as \"SELECT\" for the source table in a\r\n\"CREATE TABLE LIKE\" statement. An authenticated user could obtain sensitive\r\ninformation, such as the table structure. (CVE-2007-3781)\r\n\r\nA flaw was discovered in MySQL that allowed an authenticated user to gain\r\nupdate privileges for a table in another database, via a view that refers\r\nto the external table. (CVE-2007-3782)\r\n\r\nMySQL did not require the \"DROP\" privilege for \"RENAME TABLE\" statements.\r\nAn authenticated user could use this flaw to rename arbitrary tables.\r\n(CVE-2007-2691)\r\n\r\nA flaw was discovered in the mysql_change_db function when returning from\r\nSQL SECURITY INVOKER stored routines. An authenticated user could use this\r\nflaw to gain database privileges. (CVE-2007-2692)\r\n\r\nMySQL allowed an authenticated user to bypass logging mechanisms via SQL\r\nqueries that contain the NULL character, which were not properly handled by\r\nthe mysql_real_query function. (CVE-2006-0903)\r\n\r\nMySQL allowed an authenticated user to access a table through a previously\r\ncreated MERGE table, even after the user's privileges were revoked from\r\nthe original table, which might violate intended security policy. This is\r\naddressed by allowing the MERGE storage engine to be disabled, which can\r\nbe done by running mysqld with the \"--skip-merge\" option. (CVE-2006-4031)\r\n\r\nMySQL evaluated arguments in the wrong security context, which allowed an\r\nauthenticated user to gain privileges through a routine that had been made\r\navailable using \"GRANT EXECUTE\". (CVE-2006-4227)\r\n\r\nMultiple flaws in MySQL allowed an authenticated user to cause the MySQL\r\ndaemon to crash via crafted SQL queries. This only caused a temporary\r\ndenial of service, as the MySQL daemon is automatically restarted after the\r\ncrash. (CVE-2006-7232, CVE-2007-1420, CVE-2007-2583)\r\n\r\nAs well, these updated packages fix the following bugs:\r\n\r\n* a separate counter was used for \"insert delayed\" statements, which caused\r\nrows to be discarded. In these updated packages, \"insert delayed\"\r\nstatements no longer use a separate counter, which resolves this issue.\r\n\r\n* due to a bug in the Native POSIX Thread Library, in certain situations,\r\n\"flush tables\" caused a deadlock on tables that had a read lock. The mysqld\r\ndaemon had to be killed forcefully. Now, \"COND_refresh\" has been replaced\r\nwith \"COND_global_read_lock\", which resolves this issue.\r\n\r\n* mysqld crashed if a query for an unsigned column type contained a\r\nnegative value for a \"WHERE [column] NOT IN\" subquery.\r\n\r\n* in master and slave server situations, specifying \"on duplicate key\r\nupdate\" for \"insert\" statements did not update slave servers.\r\n\r\n* in the mysql client, empty strings were displayed as \"NULL\". For\r\nexample, running \"insert into [table-name] values (' ');\" resulted in a\r\n\"NULL\" entry being displayed when querying the table using \"select * from\r\n[table-name];\".\r\n\r\n* a bug in the optimizer code resulted in certain queries executing much\r\nslower than expected.\r\n\r\n* on 64-bit PowerPC architectures, MySQL did not calculate the thread stack\r\nsize correctly, which could have caused MySQL to crash when overly-complex\r\nqueries were used.\r\n\r\nNote: these updated packages upgrade MySQL to version 5.0.45. For a full\r\nlist of bug fixes and enhancements, refer to the MySQL release notes:\r\nhttp://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0.html\r\n\r\nAll mysql users are advised to upgrade to these updated packages, which\r\nresolve these issues.", "modified": "2017-09-08T11:50:31", "published": "2008-05-20T04:00:00", "id": "RHSA-2008:0364", "href": "https://access.redhat.com/errata/RHSA-2008:0364", "type": "redhat", "title": "(RHSA-2008:0364) Low: mysql security and bug fix update", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2020-11-11T13:16:37", "bulletinFamily": "unix", "cvelist": ["CVE-2007-2583", "CVE-2007-3780", "CVE-2007-5925", "CVE-2007-3782", "CVE-2007-2692", "CVE-2007-2691"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1413-1 security@debian.org\nhttp://www.debian.org/security/ Noah Meyerhans\nNovember 26, 2007 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : mysql-dfsg, mysql-dfsg-5.0, mysql-dfsg-4.1\nVulnerability : multiple\nProblem type : remote\nDebian-specific: no\nCVE Id(s) : CVE-2007-2583, CVE-2007-2691, CVE-2007-2692 \n CVE-2007-3780, CVE-2007-3782, CVE-2007-5925\nDebian Bug : 426353, 424778, 424778, 451235\n\nSeveral vulnerabilities have been found in the MySQL database packages\nwith implications ranging from unauthorized database modifications to\nremotely triggered server crashes.\n\nCVE-2007-2583\n\n\tThe in_decimal::set function in item_cmpfunc.cc in MySQL\n\tbefore 5.0.40 allows context-dependent attackers to cause a\n\tdenial of service (crash) via a crafted IF clause that results\n\tin a divide-by-zero error and a NULL pointer dereference.\n\t(Affects source version 5.0.32)\n\nCVE-2007-2691\n\n\tMySQL does not require the DROP privilege for RENAME TABLE\n\tstatements, which allows remote authenticated users to rename\n\tarbitrary tables. (All supported versions affected.)\n\nCVE-2007-2692\n\n\tThe mysql_change_db function does not restore THD::db_access\n\tprivileges when returning from SQL SECURITY INVOKER stored\n\troutines, which allows remote authenticated users to gain\n\tprivileges. (Affects source version 5.0.32)\n\nCVE-2007-3780\n\n\tMySQL could be made to overflow a signed char during\n\tauthentication. Remote attackers could use specially crafted\n\tauthentication requests to cause a denial of\n\tservice. (Upstream source versions 4.1.11a and 5.0.32\n\taffected.)\n\nCVE-2007-3782\n\n\tPhil Anderton discovered that MySQL did not properly verify\n\taccess privileges when accessing external tables. As a result,\n\tauthenticated users could exploit this to obtain UPDATE\n\tprivileges to external tables. (Affects source version\n\t5.0.32)\n\nCVE-2007-5925\n\n\tThe convert_search_mode_to_innobase function in ha_innodb.cc\n\tin the InnoDB engine in MySQL 5.1.23-BK and earlier allows\n\tremote authenticated users to cause a denial of service\n\t(database crash) via a certain CONTAINS operation on an\n\tindexed column, which triggers an assertion error. (Affects\n\tsource version 5.0.32)\n\n\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 5.0.32-7etch3 of the mysql-dfsg-5.0 packages\n\nFor the old stable distribution (sarge), these problems have been\nfixed in version 4.0.24-10sarge3 of mysql-dfsg and version\n4.1.11a-4sarge8 of mysql-dfsg-4.1\n\nWe recommend that you upgrade your mysql packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch3.diff.gz\n Size/MD5 checksum: 158239 ceb5a1f5875bd86c34f1c8711fff1512\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32.orig.tar.gz\n Size/MD5 checksum: 16439441 f99df050b0b847adf7702b44e79ac877\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch3.dsc\n Size/MD5 checksum: 1117 1f37ff72f1d5276c52b1adcebe796704\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-common_5.0.32-7etch3_all.deb\n Size/MD5 checksum: 53548 5eab71c3e41f585dfb86f360cf9413a8\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server_5.0.32-7etch3_all.deb\n Size/MD5 checksum: 47306 e3e2cf556bcf98b077090b9aa1551973\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client_5.0.32-7etch3_all.deb\n Size/MD5 checksum: 45228 8ae0496a27a9919f0ef79100a294cb5c\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch3_alpha.deb\n Size/MD5 checksum: 27367610 5b031c91101fc26da9fce90649f6af4f\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch3_alpha.deb\n Size/MD5 checksum: 8406582 2a6b482ac43acc702aba070ac16410f1\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch3_alpha.deb\n Size/MD5 checksum: 1949566 65956545169d0494303614308dd5fc71\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch3_alpha.deb\n Size/MD5 checksum: 47356 eacd0a3b3588c14b26806e739e81c003\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch3_alpha.deb\n Size/MD5 checksum: 8912162 ef51f26850391ea2b46df1e479de7298\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch3_amd64.deb\n Size/MD5 checksum: 1829436 137139b9722adcad521d72048bc870a0\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch3_amd64.deb\n Size/MD5 checksum: 25937824 d0b8b7d295213217b780d5f78dd48753\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch3_amd64.deb\n Size/MD5 checksum: 7374926 c86423aa3d5024a1e9829e94686d0a80\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch3_amd64.deb\n Size/MD5 checksum: 7545502 c28dd59a10fe782a11ed92d4f41e02d3\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch3_amd64.deb\n Size/MD5 checksum: 47334 00c4901d4a7e889d346788668d03b76d\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch3_hppa.deb\n Size/MD5 checksum: 1919950 77ed051af8da085483401586783168a6\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch3_hppa.deb\n Size/MD5 checksum: 8003408 df40aa6aae5261b7e19389b6aeccd517\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch3_hppa.deb\n Size/MD5 checksum: 8043764 9f2c5326cbe83478904b5fbb44a566d5\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch3_hppa.deb\n Size/MD5 checksum: 27053986 748ee990de95a70a1f12bf8d82836458\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch3_hppa.deb\n Size/MD5 checksum: 47338 2fbe0c22b854160efc3fbe57130d78cc\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch3_i386.deb\n Size/MD5 checksum: 7188116 2c7a41713a396c8aecedc8b924f348a1\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch3_i386.deb\n Size/MD5 checksum: 6968400 09df50c04d87f934b021188d28a6de56\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch3_i386.deb\n Size/MD5 checksum: 1793210 1be98453fe240009dd910bb4f3ce6ecb\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch3_i386.deb\n Size/MD5 checksum: 25356378 112399fe4ec962c0ed807768880a7770\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch3_i386.deb\n Size/MD5 checksum: 47336 c303c553a72e9819ea90efbd04973bbb\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch3_ia64.deb\n Size/MD5 checksum: 30405568 8daba01d54e639051eb5bffeada3e9cb\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch3_ia64.deb\n Size/MD5 checksum: 9734712 d34c17a16de0cf2746fccb6abc920f84\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch3_ia64.deb\n Size/MD5 checksum: 2114634 eff36d5639abca158981d0d3b6855da5\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch3_ia64.deb\n Size/MD5 checksum: 47336 86b6a4b42b83c6e308ac4be5245a1e00\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch3_ia64.deb\n Size/MD5 checksum: 10338428 67eb004fa1fae7eb752fc3e328f24fc2\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch3_mips.deb\n Size/MD5 checksum: 7655162 fb5957d30c35fcd1e94d478df13d126f\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch3_mips.deb\n Size/MD5 checksum: 26336066 6068caefe4e50c1a0c7c1d2f016cfe89\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch3_mips.deb\n Size/MD5 checksum: 1835184 7d23cc0b5d3d34fc1c965ae416355f07\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch3_mips.deb\n Size/MD5 checksum: 47334 b81bf61ee49f02d6e952e86c1c7ef494\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch3_mips.deb\n Size/MD5 checksum: 7748034 c2265fed6ee82de7a87429aaeb3f3834\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch3_mipsel.deb\n Size/MD5 checksum: 1788816 cda01fa6f2def40f0c947caa8f8c1da2\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch3_mipsel.deb\n Size/MD5 checksum: 7639546 afd466efeeddb85feaeef28987c03e35\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch3_mipsel.deb\n Size/MD5 checksum: 47340 d36af99d1b815f62f39149fddcbd27de\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch3_mipsel.deb\n Size/MD5 checksum: 25845048 20a84270663df2b65110a8b669aee37a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch3_mipsel.deb\n Size/MD5 checksum: 7559536 589510f9e026bde91e70c9b4ad78ea6a\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch3_powerpc.deb\n Size/MD5 checksum: 26161766 9ff509c8158d9f4381843daf29d90cb4\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch3_powerpc.deb\n Size/MD5 checksum: 47336 cbbc6088151475e9003d6ce245e7ea7a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch3_powerpc.deb\n Size/MD5 checksum: 7511054 c4d1aa7227f49402604aabb82ec391a2\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch3_powerpc.deb\n Size/MD5 checksum: 7572150 f67c846d62cf2da02e073d75f5e97831\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch3_powerpc.deb\n Size/MD5 checksum: 1831826 d2be47b8486e73a5056b29873fc5f379\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch3_s390.deb\n Size/MD5 checksum: 7507308 50acb63d4680441570d0180152af6dc4\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch3_s390.deb\n Size/MD5 checksum: 26762652 fe88146edc3286d12fc06596b55fb56a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch3_s390.deb\n Size/MD5 checksum: 7412232 2d4e9fbce49e7248b91de25f2524a12a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch3_s390.deb\n Size/MD5 checksum: 1951276 179a3a70d258114616e2aa98b43a7896\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch3_s390.deb\n Size/MD5 checksum: 47336 f89bb547bf6727493dccff6188c0bacd\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-dfsg_4.0.24-10sarge3.dsc\n Size/MD5 checksum: 959 79f665363e1949c6848b9ccd79774d08\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-dfsg_4.0.24.orig.tar.gz\n Size/MD5 checksum: 9923794 aed8f335795a359f32492159e3edfaa3\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-dfsg_4.0.24-10sarge3.diff.gz\n Size/MD5 checksum: 100288 c8a09fb8a55fb6ae086d80aecc09e5f5\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a-4sarge8.dsc\n Size/MD5 checksum: 1021 3e72ca407001f3a821af22528aeb4167\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a.orig.tar.gz\n Size/MD5 checksum: 15771855 3c0582606a8903e758c2014c2481c7c3\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a-4sarge8.diff.gz\n Size/MD5 checksum: 166363 3a827fee8740fbedbe7c114075351847\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-common_4.0.24-10sarge3_all.deb\n Size/MD5 checksum: 34692 ccc11adc92b89539535dadf270d47ffe\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.11a-4sarge8_all.deb\n Size/MD5 checksum: 36954 13af7dbf0b5e55c57b22f66611d6f39c\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge3_alpha.deb\n Size/MD5 checksum: 524476 83c832e4a2c8740a07ec8ecc69850de3\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge3_alpha.deb\n Size/MD5 checksum: 4896532 b9db7c1604c82b49b960266452f179b9\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge8_alpha.deb\n Size/MD5 checksum: 17499908 f7dbe472481d4404556f8b18c621b02a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge3_alpha.deb\n Size/MD5 checksum: 4534572 1782d264a4c7702af2d6bc3ca8b08ca4\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge8_alpha.deb\n Size/MD5 checksum: 1005618 89d391d8186f37393b6f6230e9749aa1\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge8_alpha.deb\n Size/MD5 checksum: 1592832 7e2b8f6c948fd331bbbbde5d9c68d459\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge8_alpha.deb\n Size/MD5 checksum: 7972820 924ddc2e807ced4e65d84a044d01c101\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge3_alpha.deb\n Size/MD5 checksum: 356840 49415e6524100bad42d375b8e1a746b5\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge3_amd64.deb\n Size/MD5 checksum: 3878532 bfd14013a3cfea4ada8c0bb4f61adac5\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge3_amd64.deb\n Size/MD5 checksum: 3182788 9f16c1b574b822b83af24b083e0bf008\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge8_amd64.deb\n Size/MD5 checksum: 5552302 68e16ff3668b2a97698f41351d4c5b14\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge8_amd64.deb\n Size/MD5 checksum: 850010 5746928e2118b74835ea6f9f33a3ff90\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge3_amd64.deb\n Size/MD5 checksum: 309618 9628c1cb0c3988e7a8ca4c1788e7bbfb\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge8_amd64.deb\n Size/MD5 checksum: 1452492 b5f79b0bcdc6bf3b21b5f766ae94f1d9\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge3_amd64.deb\n Size/MD5 checksum: 434160 1a89003c4a9d54e9b8942232ee42ce1c\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge8_amd64.deb\n Size/MD5 checksum: 14711934 2176f9ed1b9049b049d6a755f201677a\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge8_hppa.deb\n Size/MD5 checksum: 15791836 18fc8a2cf9f1ff120c50a00579285ba7\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge8_hppa.deb\n Size/MD5 checksum: 1551666 2060ce8666a508dab761c3f6044f9de4\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge3_hppa.deb\n Size/MD5 checksum: 3314510 c3355ecb5c2b96478dea993a48e4ade1\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge3_hppa.deb\n Size/MD5 checksum: 330088 f81f69b7a00213483a2ee47961b0fa8a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge8_hppa.deb\n Size/MD5 checksum: 910486 34ce1dd85f8b3102c8320608db2ac49b\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge8_hppa.deb\n Size/MD5 checksum: 6250742 e741c50def86f096fc3e5f33d2546e4b\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge3_hppa.deb\n Size/MD5 checksum: 456142 15f3655a889ab79f32a05a6ec4e6d3eb\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge3_hppa.deb\n Size/MD5 checksum: 3947328 2580ee426cdb77ecb018ad66a2de271a\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge3_i386.deb\n Size/MD5 checksum: 297144 9d9a3af124735f4f2ddc2bf2d8080441\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge3_i386.deb\n Size/MD5 checksum: 3652532 dc9c0f6c46d5cf4980626b8bf1478c2b\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge8_i386.deb\n Size/MD5 checksum: 5645942 e4cf4980b8dcd3ade7f97744ff7cd627\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge3_i386.deb\n Size/MD5 checksum: 417172 6d0d21ab328bb10704a453018a9fbe0f\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge8_i386.deb\n Size/MD5 checksum: 1418578 c3c5800beb238eadcb44bc5cae668a09\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge8_i386.deb\n Size/MD5 checksum: 831594 1e9acc111598dbeae29405174e98f8eb\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge8_i386.deb\n Size/MD5 checksum: 14573956 cf379b4463dc21d6afe6bbc4d66e2e46\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge3_i386.deb\n Size/MD5 checksum: 2921244 524bcb7f1d70efd731623e0f9a1d60e2\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge3_ia64.deb\n Size/MD5 checksum: 4472620 c8fc82cd6fde1292e8c8ecaa52010208\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge8_ia64.deb\n Size/MD5 checksum: 18476390 00d4a9e3dbb4d4aaf6413956f11fda92\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge8_ia64.deb\n Size/MD5 checksum: 1713832 6a39a0d7365c737be61622837bac5dca\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge8_ia64.deb\n Size/MD5 checksum: 7783060 37a93f7334445189a7da139eb49823bb\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge3_ia64.deb\n Size/MD5 checksum: 395506 132724ad264cc04490ea24e748ce1851\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge3_ia64.deb\n Size/MD5 checksum: 5328724 b1b99174117f19d4c4b9c623ed01df56\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge8_ia64.deb\n Size/MD5 checksum: 1051002 41347335283f500399239a1f1a4775d8\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge3_ia64.deb\n Size/MD5 checksum: 563102 6b985dc902aae54259452d31df50cd24\n\nm68k architecture (Motorola Mc680x0)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge8_m68k.deb\n Size/MD5 checksum: 14072444 45218793b9ec9add8c60d7d5b9d5ecff\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge8_m68k.deb\n Size/MD5 checksum: 1398428 ce0c0458d7823cf25b16597478b4c642\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge8_m68k.deb\n Size/MD5 checksum: 5284906 3e5fa51be89bd067204ae48559861520\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge3_m68k.deb\n Size/MD5 checksum: 2665842 ab25785d95a7f3fdadb378be8b06cd0e\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge8_m68k.deb\n Size/MD5 checksum: 804284 6004dfa406aea7d976c66ad16e719ed7\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge3_m68k.deb\n Size/MD5 checksum: 279626 a4b26bba2ac95ad3143151284bfeba94\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge3_m68k.deb\n Size/MD5 checksum: 390416 eca95af258b0c05d028da111b56a4861\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge3_m68k.deb\n Size/MD5 checksum: 3293164 f8a2690deb9bfa8aaee3e687da053b8f\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge3_mips.deb\n Size/MD5 checksum: 3182420 da3365e2f5591091b8dac2b0971ecc06\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge8_mips.deb\n Size/MD5 checksum: 6053548 8279dfc879a2b2a59f63600a96fdca39\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge3_mips.deb\n Size/MD5 checksum: 3813468 bdcb203b023634e31be39fd620fdbc2b\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge8_mips.deb\n Size/MD5 checksum: 1479412 86378b3184949727fb41c09b4d4ca7c6\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge8_mips.deb\n Size/MD5 checksum: 15410656 11b75dc0f14e6f9269c05687619588f6\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge8_mips.deb\n Size/MD5 checksum: 904966 5eda6f9a63f4de3822fbdab24b2032a3\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge3_mips.deb\n Size/MD5 checksum: 457402 757c58c311483de54a36d08769f9c1a7\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge3_mips.deb\n Size/MD5 checksum: 314286 4c4ada1ce8947b6966fcddb5f22f95d5\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge8_mipsel.deb\n Size/MD5 checksum: 890636 ce0dd4c2e900f46d4dc05ad8133e3a88\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge3_mipsel.deb\n Size/MD5 checksum: 3800518 c00e254b7f48ae49290cd7dd31753d7a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge8_mipsel.deb\n Size/MD5 checksum: 5971808 9629c320f1af7853259439fdeae30780\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge8_mipsel.deb\n Size/MD5 checksum: 1446828 6d41d040546857e1f9761f24bab9eda3\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge3_mipsel.deb\n Size/MD5 checksum: 457406 652de57a0f442df039cd6d3b1f16d2de\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge3_mipsel.deb\n Size/MD5 checksum: 3170108 e6aebf4bf3d5104ccc17344b45c57d6d\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge8_mipsel.deb\n Size/MD5 checksum: 15105928 b9763453f6182b1d455318a3c33d1530\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge3_mipsel.deb\n Size/MD5 checksum: 313988 491f203b6400811b9e1e36564bc6ddde\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge3_powerpc.deb\n Size/MD5 checksum: 3842466 2917a7734614ffda7b05b7c405601aee\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge3_powerpc.deb\n Size/MD5 checksum: 464746 c27ca4aef0faba749ed9884a29426264\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge3_powerpc.deb\n Size/MD5 checksum: 3184324 cfad0b1cbf4755e0207f499d8b7d8888\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge8_powerpc.deb\n Size/MD5 checksum: 907956 524cb85860e1095c7f51cf9f99e41fe7\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge8_powerpc.deb\n Size/MD5 checksum: 15403470 ab134b91f282ef187b9a1b8111b232ee\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge3_powerpc.deb\n Size/MD5 checksum: 315226 16e34511be65bced2891ad6c802758ee\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge8_powerpc.deb\n Size/MD5 checksum: 6028094 a40f646aabe6fac0fed85d68e0f2e8af\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge8_powerpc.deb\n Size/MD5 checksum: 1477348 4912345b9fa0387a45145c4a57943e90\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge8_s390.deb\n Size/MD5 checksum: 15055668 d9676ace09d308e85753c9948bf71260\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge3_s390.deb\n Size/MD5 checksum: 442530 5a5979fc69d824957df213a5359817af\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge3_s390.deb\n Size/MD5 checksum: 2830430 1c10f46c702ac43421dab5fd31c99222\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge3_s390.deb\n Size/MD5 checksum: 3665930 9e8d73a35f26940bf5ad761a7fbc2cc9\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge8_s390.deb\n Size/MD5 checksum: 5461984 d678870cdf69e36fa48f9e7805c8d226\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge8_s390.deb\n Size/MD5 checksum: 1539020 499b59166b4fb0645baa3cdb2640f9bb\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge8_s390.deb\n Size/MD5 checksum: 884768 e1a53219771e9cda40724ef31d5aeb5a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge3_s390.deb\n Size/MD5 checksum: 324802 3c008c24e23b9388800c735085a2bffd\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge8_sparc.deb\n Size/MD5 checksum: 1460892 671fb72c4664b823d92a967fe62a6def\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge3_sparc.deb\n Size/MD5 checksum: 430132 53e0deb3e36c605c6e23e1f997ff1cfe\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge3_sparc.deb\n Size/MD5 checksum: 304778 5b7dcd84615b8d05da23e7a0aaf7d24b\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge8_sparc.deb\n Size/MD5 checksum: 15392390 3316fb8ca5d77ab41217556778e27a6c\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge3_sparc.deb\n Size/MD5 checksum: 3270084 c5639359a39f097fabbd579ddf9dcf9f\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge8_sparc.deb\n Size/MD5 checksum: 868724 1fdb7040fdae0efdbc0efe4a69a12ffb\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge8_sparc.deb\n Size/MD5 checksum: 6208522 7ca5e1f738d1071826f860343273d97a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge3_sparc.deb\n Size/MD5 checksum: 3821768 3910007d21f7e4227b5bef66f8a4b54c\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 7, "modified": "2007-11-26T00:00:00", "published": "2007-11-26T00:00:00", "id": "DEBIAN:DSA-1413-1:E917F", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00193.html", "title": "[SECURITY] [DSA 1413-1] New mysql packages fix multiple vulnerabilities", "type": "debian", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "cvelist": ["CVE-2007-3782"], "description": "# No description provided by the source\n\n## References:\nVendor URL: http://www.mysql.com/\nVendor Specific News/Changelog Entry: http://bugs.mysql.com/bug.php?id=27878\nVendor Specific News/Changelog Entry: http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-45.html\nSecurity Tracker: 1018663\n[Secunia Advisory ID:26073](https://secuniaresearch.flexerasoftware.com/advisories/26073/)\n[Secunia Advisory ID:26430](https://secuniaresearch.flexerasoftware.com/advisories/26430/)\n[Secunia Advisory ID:27155](https://secuniaresearch.flexerasoftware.com/advisories/27155/)\n[Secunia Advisory ID:26710](https://secuniaresearch.flexerasoftware.com/advisories/26710/)\n[Secunia Advisory ID:27823](https://secuniaresearch.flexerasoftware.com/advisories/27823/)\n[Secunia Advisory ID:26987](https://secuniaresearch.flexerasoftware.com/advisories/26987/)\n[Secunia Advisory ID:25301](https://secuniaresearch.flexerasoftware.com/advisories/25301/)\nRedHat RHSA: RHSA-2007:0894\nOther Advisory URL: https://issues.rpath.com/browse/RPL-1536\nOther Advisory URL: http://www.redhat.com/support/errata/RHSA-2007-0894.html\nOther Advisory URL: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00193.html\nOther Advisory URL: http://www.ubuntu.com/usn/usn-528-1\nOther Advisory URL: http://www.ubuntulinux.org/support/documentation/usn/usn-528-1\nOther Advisory URL: http://lists.opensuse.org/opensuse-security-announce/2007-09/msg00003.html\nOther Advisory URL: http://lists.rpath.com/pipermail/security-announce/2007-August/000224.html\nOther Advisory URL: http://frontal2.mandriva.com/security/advisories?name=MDKSA-2007:177\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2007_19_sr.html\n[CVE-2007-3782](https://vulners.com/cve/CVE-2007-3782)\nBugtraq ID: 25017\n", "edition": 1, "modified": "2007-04-17T19:52:49", "published": "2007-04-17T19:52:49", "href": "https://vulners.com/osvdb/OSVDB:37782", "id": "OSVDB:37782", "title": "MySQL Community Server External Table View Privilege Escalation", "type": "osvdb", "cvss": {"score": 3.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:32", "bulletinFamily": "software", "cvelist": ["CVE-2007-3780"], "description": "## Solution Description\nUpgrade to version 5.0.45 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor Specific News/Changelog Entry: http://bugs.mysql.com/bug.php?id=28984\nVendor Specific News/Changelog Entry: http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-45.html\n[Secunia Advisory ID:26073](https://secuniaresearch.flexerasoftware.com/advisories/26073/)\n[Secunia Advisory ID:26430](https://secuniaresearch.flexerasoftware.com/advisories/26430/)\n[Secunia Advisory ID:27155](https://secuniaresearch.flexerasoftware.com/advisories/27155/)\n[Secunia Advisory ID:27823](https://secuniaresearch.flexerasoftware.com/advisories/27823/)\n[Secunia Advisory ID:26987](https://secuniaresearch.flexerasoftware.com/advisories/26987/)\n[Secunia Advisory ID:26621](https://secuniaresearch.flexerasoftware.com/advisories/26621/)\nRedHat RHSA: RHSA-2007:0875\nOther Advisory URL: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00193.html\nOther Advisory URL: http://www.ubuntu.com/usn/usn-528-1\nOther Advisory URL: http://lists.opensuse.org/opensuse-security-announce/2007-09/msg00003.html\nOther Advisory URL: http://lists.rpath.com/pipermail/security-announce/2007-August/000224.html\n[CVE-2007-3780](https://vulners.com/cve/CVE-2007-3780)\nBugtraq ID: 25017\n", "edition": 1, "modified": "2007-06-08T19:41:02", "published": "2007-06-08T19:41:02", "href": "https://vulners.com/osvdb/OSVDB:36732", "id": "OSVDB:36732", "title": "MySQL Community Server Connection Protocol Malformed Password Packet Remote DoS", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "centos": [{"lastseen": "2019-12-20T18:24:14", "bulletinFamily": "unix", "cvelist": ["CVE-2007-3780"], "description": "**CentOS Errata and Security Advisory** CESA-2007:0875\n\n\nMySQL is a multi-user, multi-threaded SQL database server. MySQL is a\r\nclient/server implementation consisting of a server daemon (mysqld) and\r\nmany different client programs and libraries.\r\n\r\nA flaw was discovered in MySQL's authentication protocol. It is possible\r\nfor a remote unauthenticated attacker to send a specially crafted\r\nauthentication request to the MySQL server causing it to crash. (CVE-2007-3780)\r\n\r\nAll users of the MySQL server are advised to upgrade to these updated\r\npackages, which contain a backported patch which fixes this issue.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2007-August/026193.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-August/026194.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-August/026195.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-August/026196.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-September/026197.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-September/026198.html\n\n**Affected packages:**\nmysql\nmysql-bench\nmysql-devel\nmysql-server\nmysql-test\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2007-0875.html", "edition": 4, "modified": "2007-09-01T00:43:14", "published": "2007-08-30T18:26:18", "href": "http://lists.centos.org/pipermail/centos-announce/2007-August/026193.html", "id": "CESA-2007:0875", "title": "mysql security update", "type": "centos", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:34:28", "bulletinFamily": "unix", "cvelist": ["CVE-2007-3780"], "description": " [4.1.20-2.RHEL4.1.0.1]\n - Fix CVE-2007-3780: remote DOS via bad password length byte\n Resolves: #257621\n - Workaround for new gcc bug on ia64: it locks up while compiling \n sql_table.cc ", "edition": 4, "modified": "2007-08-30T00:00:00", "published": "2007-08-30T00:00:00", "id": "ELSA-2007-0875", "href": "http://linux.oracle.com/errata/ELSA-2007-0875.html", "title": "Important: mysql security update ", "type": "oraclelinux", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:34:14", "bulletinFamily": "unix", "cvelist": ["CVE-2007-6303", "CVE-2007-2583", "CVE-2007-3780", "CVE-2006-7232", "CVE-2006-4227", "CVE-2007-3781", "CVE-2006-4031", "CVE-2007-1420", "CVE-2007-5925", "CVE-2007-3782", "CVE-2007-5969", "CVE-2006-0903", "CVE-2007-2692", "CVE-2007-2691"], "description": "[5.0.45-7]\n- Adjust thread stack requests to allow for platform-specific guard page size;\n necessary to prevent stack overrun on PPC with RHEL5's 64K page size.\nResolves: #435391\n- Remove calendar-dependent queries from 'view' test; necessary to get\n regression tests to pass after 2007.\n[5.0.45-6]\n- Back-port upstream fixes for CVE-2007-5925, CVE-2007-5969, CVE-2007-6303.\nResolves: #422211\n[5.0.45-1]\n- Update to MySQL 5.0.45\nResolves: #256501, #240813, #246309, #254012\nResolves: #280811, #316451, #349121, #367131\n- Synchronize with current Fedora package, which is pretty well tested by now;\n see past bzs 245770, 241912, 233771, 221085, 223713, 203910, 193559, 199368\n[5.0.22-3]\n- Fix CVE-2007-3780: remote DOS via bad password length byte\nResolves: #257681", "edition": 4, "modified": "2008-05-30T00:00:00", "published": "2008-05-30T00:00:00", "id": "ELSA-2008-0364", "href": "http://linux.oracle.com/errata/ELSA-2008-0364.html", "title": "mysql security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.1, "vector": "AV:N/AC:H/Au:S/C:C/I:C/A:C"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:18", "bulletinFamily": "unix", "cvelist": ["CVE-2007-3780"], "description": "\nMySQL reports:\n\nA malformed password packet in the connection protocol\n\t could cause the server to crash.\n\n", "edition": 4, "modified": "2007-07-15T00:00:00", "published": "2007-07-15T00:00:00", "id": "240AC24C-DFF3-11DD-A765-0030843D3802", "href": "https://vuxml.freebsd.org/freebsd/240ac24c-dff3-11dd-a765-0030843d3802.html", "title": "mysql -- remote dos via malformed password packet", "type": "freebsd", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:54", "bulletinFamily": "unix", "cvelist": ["CVE-2007-3780", "CVE-2007-3781"], "description": "### Background\n\nMySQL is a popular multi-threaded, multi-user SQL server. \n\n### Description\n\nDormando reported a vulnerability within the handling of password packets in the connection protocol (CVE-2007-3780). Andrei Elkin also found that the \"CREATE TABLE LIKE\" command didn't require SELECT privileges on the source table (CVE-2007-3781). \n\n### Impact\n\nA remote unauthenticated attacker could use the first vulnerability to make the server crash. The second vulnerability can be used by authenticated users to obtain information on tables they are not normally able to access. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll MySQL users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-db/mysql-5.0.44\"", "edition": 1, "modified": "2007-08-16T00:00:00", "published": "2007-08-16T00:00:00", "id": "GLSA-200708-10", "href": "https://security.gentoo.org/glsa/200708-10", "type": "gentoo", "title": "MySQL: Denial of Service and information leakage", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}]}