Lucene search

K
openvasCopyright (c) 2013 Greenbone Networks GmbHOPENVAS:881578
HistoryJan 24, 2013 - 12:00 a.m.

CentOS Update for mysql CESA-2013:0180 centos5

2013-01-2400:00:00
Copyright (c) 2013 Greenbone Networks GmbH
plugins.openvas.org
11

0.972 High

EPSS

Percentile

99.8%

Check for the Version of mysql

###############################################################################
# OpenVAS Vulnerability Test
#
# CentOS Update for mysql CESA-2013:0180 centos5 
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

include("revisions-lib.inc");
tag_insight = "MySQL is a multi-user, multi-threaded SQL database server. It consists of
  the MySQL server daemon (mysqld) and many client programs and libraries.

  A stack-based buffer overflow flaw was found in the user permission
  checking code in MySQL. An authenticated database user could use this flaw
  to crash the mysqld daemon or, potentially, execute arbitrary code with the
  privileges of the user running the mysqld daemon. (CVE-2012-5611)
  
  A flaw was found in the way MySQL calculated the key length when creating
  a sort order index for certain queries. An authenticated database user
  could use this flaw to crash the mysqld daemon. (CVE-2012-2749)
  
  This update also adds a patch for a potential flaw in the MySQL password
  checking function, which could allow an attacker to log into any MySQL
  account without knowing the correct password. This problem (CVE-2012-2122)
  only affected MySQL packages that use a certain compiler and C library
  optimization. It did not affect the mysql packages in Red Hat Enterprise
  Linux 5. The patch is being added as a preventive measure to ensure this
  problem cannot get exposed in future revisions of the mysql packages.
  (BZ#814605)
  
  All MySQL users should upgrade to these updated packages, which correct
  these issues. After installing this update, the MySQL server daemon
  (mysqld) will be restarted automatically.";


tag_affected = "mysql on CentOS 5";
tag_solution = "Please Install the Updated Packages.";



if(description)
{
  script_xref(name : "URL" , value : "http://lists.centos.org/pipermail/centos-announce/2013-January/019207.html");
  script_id(881578);
  script_version("$Revision: 8494 $");
  script_tag(name:"last_modification", value:"$Date: 2018-01-23 07:57:55 +0100 (Tue, 23 Jan 2018) $");
  script_tag(name:"creation_date", value:"2013-01-24 09:27:22 +0530 (Thu, 24 Jan 2013)");
  script_cve_id("CVE-2012-2749", "CVE-2012-5611", "CVE-2012-2122");
  script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_xref(name: "CESA", value: "2013:0180");
  script_name("CentOS Update for mysql CESA-2013:0180 centos5 ");

  script_tag(name: "summary" , value: "Check for the Version of mysql");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (c) 2013 Greenbone Networks GmbH");
  script_family("CentOS Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/centos", "ssh/login/rpms");
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}


include("pkg-lib-rpm.inc");

release = get_kb_item("ssh/login/release");

res = "";
if(release == NULL){
  exit(0);
}

if(release == "CentOS5")
{

  if ((res = isrpmvuln(pkg:"mysql", rpm:"mysql~5.0.95~5.el5_9", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"mysql-bench", rpm:"mysql-bench~5.0.95~5.el5_9", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"mysql-devel", rpm:"mysql-devel~5.0.95~5.el5_9", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"mysql-server", rpm:"mysql-server~5.0.95~5.el5_9", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"mysql-test", rpm:"mysql-test~5.0.95~5.el5_9", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}