6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
Several vulnerabilities have been discovered in MySQL, a popular
database. The Common Vulnerabilities and Exposures project identifies
the following problems:
CAN-2004-0957
Sergei Golubchik discovered a problem in the access handling for
similar named databases. If a user is granted privileges to a
database with a name containing an underscore (“_”), the user also
gains privileges to other databases with similar names.
CAN-2005-0709
Stefano Di Paola discovered that MySQL allows remote
authenticated users with INSERT and DELETE privileges to execute
arbitrary code by using CREATE FUNCTION to access libc calls.
CAN-2005-0710
Stefano Di Paola discovered that MySQL allows remote authenticated
users with INSERT and DELETE privileges to bypass library path
restrictions and execute arbitrary libraries by using INSERT INTO
to modify the mysql.func table.
CAN-2005-0711
Stefano Di Paola discovered that MySQL uses predictable file names
when creating temporary tables, which allows local users with
CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via
a symlink attack.
For the stable distribution (woody) these problems have been fixed in
version 3.23.49-8.11.
For the unstable distribution (sid) these problems have been fixed in
version 4.0.24-5 of mysql-dfsg and in version 4.1.10a-6 of
mysql-dfsg-4.1.
We recommend that you upgrade your mysql packages.
CPE | Name | Operator | Version |
---|---|---|---|
mysql | eq | 3.23.49-8.10 | |
mysql | eq | 3.23.49-8.9 | |
mysql | eq | 3.23.49-8.8 |