Lucene search

K
osvGoogleOSV:DSA-707-1
HistoryApr 13, 2005 - 12:00 a.m.

mysql - several

2005-04-1300:00:00
Google
osv.dev
10

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

Several vulnerabilities have been discovered in MySQL, a popular
database. The Common Vulnerabilities and Exposures project identifies
the following problems:

  • CAN-2004-0957
    Sergei Golubchik discovered a problem in the access handling for
    similar named databases. If a user is granted privileges to a
    database with a name containing an underscore (“_”), the user also
    gains privileges to other databases with similar names.

  • CAN-2005-0709
    Stefano Di Paola discovered that MySQL allows remote
    authenticated users with INSERT and DELETE privileges to execute
    arbitrary code by using CREATE FUNCTION to access libc calls.

  • CAN-2005-0710
    Stefano Di Paola discovered that MySQL allows remote authenticated
    users with INSERT and DELETE privileges to bypass library path
    restrictions and execute arbitrary libraries by using INSERT INTO
    to modify the mysql.func table.

  • CAN-2005-0711
    Stefano Di Paola discovered that MySQL uses predictable file names
    when creating temporary tables, which allows local users with
    CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via
    a symlink attack.

For the stable distribution (woody) these problems have been fixed in
version 3.23.49-8.11.

For the unstable distribution (sid) these problems have been fixed in
version 4.0.24-5 of mysql-dfsg and in version 4.1.10a-6 of
mysql-dfsg-4.1.

We recommend that you upgrade your mysql packages.

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P