ID SECURITYVULNS:DOC:25096 Type securityvulns Reporter Securityvulns Modified 2010-11-09T00:00:00
Description
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2010:155-1
http://www.mandriva.com/security/
Package : mysql
Date : November 8, 2010
Affected: 2009.1
Problem Description:
Multiple vulnerabilities has been found and corrected in mysql:
MySQL before 5.1.48 allows remote authenticated users with alter
database privileges to cause a denial of service (server crash
and database loss) via an ALTER DATABASE command with a #mysql50#
string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or
similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which
causes MySQL to move certain directories to the server data directory
(CVE-2010-2008).
Additionally many security issues noted in the 5.1.49 release notes
has been addressed with this advisory as well, such as:
LOAD DATA INFILE did not check for SQL errors and sent an OK packet
even when errors were already reported. Also, an assert related to
client-server protocol checking in debug servers sometimes was raised
when it should not have been. (Bug#52512) (CVE-2010-3683)
Using EXPLAIN with queries of the form SELECT ... UNION ... ORDER
BY (SELECT ... WHERE ...) could cause a server crash. (Bug#52711)
(CVE-2010-3682)
The server could crash if there were alternate reads from two indexes
on a table using the HANDLER interface. (Bug#54007) (CVE-2010-3681)
A malformed argument to the BINLOG statement could result in Valgrind
warnings or a server crash. (Bug#54393) (CVE-2010-3679)
Incorrect handling of NULL arguments could lead to a crash for IN()
or CASE operations when NULL arguments were either passed explicitly
as arguments (for IN()) or implicitly generated by the WITH ROLLUP
modifier (for IN() and CASE). (Bug#54477) (CVE-2010-3678)
Joins involving a table with with a unique SET column could cause
a server crash. (Bug#54575) (CVE-2010-3677)
Use of TEMPORARY InnoDB tables with nullable columns could cause
a server crash. (Bug#54044) (CVE-2010-3680)
The updated packages have been patched to correct these issues.
Update:
Packages for 2009.1 was not provided with the MDVSA-2010:155
advisory. This advisory provides the missing packages.
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
{"id": "SECURITYVULNS:DOC:25096", "bulletinFamily": "software", "title": "[ MDVSA-2010:155-1 ] mysql", "description": "\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2010:155-1\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n\r\n Package : mysql\r\n Date : November 8, 2010\r\n Affected: 2009.1\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Multiple vulnerabilities has been found and corrected in mysql:\r\n \r\n MySQL before 5.1.48 allows remote authenticated users with alter\r\n database privileges to cause a denial of service (server crash\r\n and database loss) via an ALTER DATABASE command with a #mysql50#\r\n string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or\r\n similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which\r\n causes MySQL to move certain directories to the server data directory\r\n (CVE-2010-2008).\r\n \r\n Additionally many security issues noted in the 5.1.49 release notes\r\n has been addressed with this advisory as well, such as:\r\n \r\n * LOAD DATA INFILE did not check for SQL errors and sent an OK packet\r\n even when errors were already reported. Also, an assert related to\r\n client-server protocol checking in debug servers sometimes was raised\r\n when it should not have been. (Bug#52512) (CVE-2010-3683)\r\n \r\n * Using EXPLAIN with queries of the form SELECT ... UNION ... ORDER\r\n BY (SELECT ... WHERE ...) could cause a server crash. (Bug#52711)\r\n (CVE-2010-3682)\r\n \r\n * The server could crash if there were alternate reads from two indexes\r\n on a table using the HANDLER interface. (Bug#54007) (CVE-2010-3681)\r\n \r\n * A malformed argument to the BINLOG statement could result in Valgrind\r\n warnings or a server crash. (Bug#54393) (CVE-2010-3679)\r\n \r\n * Incorrect handling of NULL arguments could lead to a crash for IN()\r\n or CASE operations when NULL arguments were either passed explicitly\r\n as arguments (for IN()) or implicitly generated by the WITH ROLLUP\r\n modifier (for IN() and CASE). (Bug#54477) (CVE-2010-3678)\r\n \r\n * Joins involving a table with with a unique SET column could cause\r\n a server crash. (Bug#54575) (CVE-2010-3677)\r\n \r\n * Use of TEMPORARY InnoDB tables with nullable columns could cause\r\n a server crash. (Bug#54044) (CVE-2010-3680)\r\n \r\n The updated packages have been patched to correct these issues.\r\n\r\n Update:\r\n\r\n Packages for 2009.1 was not provided with the MDVSA-2010:155\r\n advisory. This advisory provides the missing packages.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2008\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3683\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3682\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3681\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3679\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3678\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3677\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3680\r\n http://bugs.mysql.com/bug.php?id=52512\r\n http://bugs.mysql.com/bug.php?id=52711\r\n http://bugs.mysql.com/bug.php?id=54007\r\n http://bugs.mysql.com/bug.php?id=54393\r\n http://bugs.mysql.com/bug.php?id=54477\r\n http://bugs.mysql.com/bug.php?id=54575\r\n http://bugs.mysql.com/bug.php?id=54044\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Linux 2009.1:\r\n adfd92c6e4de06c22f7066b3880c7256 2009.1/i586/libmysql16-5.1.42-0.6mdv2009.1.i586.rpm\r\n 5961a072e203925f3e85895e71c6d114 2009.1/i586/libmysql-devel-5.1.42-0.6mdv2009.1.i586.rpm\r\n 87b2fb4508b2574b9610549cffe5d641 2009.1/i586/libmysql-static-devel-5.1.42-0.6mdv2009.1.i586.rpm\r\n 0bb6bc8032660f9441595a897e5e37c2 2009.1/i586/mysql-5.1.42-0.6mdv2009.1.i586.rpm\r\n aa383ed18610327d12846a66d6d8b5bd 2009.1/i586/mysql-bench-5.1.42-0.6mdv2009.1.i586.rpm\r\n 5abcaf797500228df411a10e9c1dd5a0 2009.1/i586/mysql-client-5.1.42-0.6mdv2009.1.i586.rpm\r\n 883b4e34ece270efb56c2eaa60a3a5f0 2009.1/i586/mysql-common-5.1.42-0.6mdv2009.1.i586.rpm\r\n 9fb48d28f8df4cb00aea4362837d2c3f 2009.1/i586/mysql-doc-5.1.42-0.6mdv2009.1.i586.rpm\r\n 67c086070030addfd770cc4d4c3db6bf 2009.1/i586/mysql-max-5.1.42-0.6mdv2009.1.i586.rpm\r\n 51e5a59f9aca3d05bbfb9a036f90ea54 2009.1/i586/mysql-ndb-extra-5.1.42-0.6mdv2009.1.i586.rpm\r\n d3da22f20148d43a625f3715f1d02be7 2009.1/i586/mysql-ndb-management-5.1.42-0.6mdv2009.1.i586.rpm\r\n a1d895e569730d42bed74d2b3b54ee0e 2009.1/i586/mysql-ndb-storage-5.1.42-0.6mdv2009.1.i586.rpm\r\n 9db83e6bd1b332ed2bcfa55c3d1cbf11 2009.1/i586/mysql-ndb-tools-5.1.42-0.6mdv2009.1.i586.rpm \r\n 39c0f1c0030455d78aa1f6c240e78f42 2009.1/SRPMS/mysql-5.1.42-0.6mdv2009.1.src.rpm\r\n\r\n Mandriva Linux 2009.1/X86_64:\r\n 81c56209ceffc1c4a8718beed142e0bd 2009.1/x86_64/lib64mysql16-5.1.42-0.6mdv2009.1.x86_64.rpm\r\n fca597b87c3f7d5d5ca40f6c24afe2c3 2009.1/x86_64/lib64mysql-devel-5.1.42-0.6mdv2009.1.x86_64.rpm\r\n 8287471cd70b341806f7e72a16222e68 2009.1/x86_64/lib64mysql-static-devel-5.1.42-0.6mdv2009.1.x86_64.rpm\r\n 5f4a264351859a08b259178c7fb6709e 2009.1/x86_64/mysql-5.1.42-0.6mdv2009.1.x86_64.rpm\r\n d5fd6ed95e52ffa75055b2e23ea880e1 2009.1/x86_64/mysql-bench-5.1.42-0.6mdv2009.1.x86_64.rpm\r\n 2621cfecdf4b53bfe363d99a9225ca31 2009.1/x86_64/mysql-client-5.1.42-0.6mdv2009.1.x86_64.rpm\r\n 1960228ef94d993486ab73a58323cc3e 2009.1/x86_64/mysql-common-5.1.42-0.6mdv2009.1.x86_64.rpm\r\n dd4821845d060dd6dac38217cc8cac66 2009.1/x86_64/mysql-doc-5.1.42-0.6mdv2009.1.x86_64.rpm\r\n 65432b5801c2ac0b4f2c536a816bc06d 2009.1/x86_64/mysql-max-5.1.42-0.6mdv2009.1.x86_64.rpm\r\n 3cf458db3d034e5998bccb70c006b71a 2009.1/x86_64/mysql-ndb-extra-5.1.42-0.6mdv2009.1.x86_64.rpm\r\n dea28a0be7cfcd99d942ce22f7999308 2009.1/x86_64/mysql-ndb-management-5.1.42-0.6mdv2009.1.x86_64.rpm\r\n 45329f869ffee6b497ad73da0a81019f 2009.1/x86_64/mysql-ndb-storage-5.1.42-0.6mdv2009.1.x86_64.rpm\r\n 72e2f6029c889723d0f003ffdbf007d1 2009.1/x86_64/mysql-ndb-tools-5.1.42-0.6mdv2009.1.x86_64.rpm \r\n 39c0f1c0030455d78aa1f6c240e78f42 2009.1/SRPMS/mysql-5.1.42-0.6mdv2009.1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFM2AekmqjQ0CJFipgRAqwGAJ0dZsRuXRZ1OfiVCwbWUNj3i3zo4ACgwnsn\r\naN2rtXXq0VzlsNd0DLVdRvw=\r\n=/o8P\r\n-----END PGP SIGNATURE-----", "published": "2010-11-09T00:00:00", "modified": "2010-11-09T00:00:00", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25096", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-2008", "CVE-2010-3683", "CVE-2010-3677"], "type": "securityvulns", "lastseen": "2018-08-31T11:10:37", "edition": 1, "viewCount": 11, "enchantments": {"score": {"value": 5.9, "vector": "NONE"}, "dependencies": {"references": [{"type": "centos", "idList": ["CESA-2010:0824", "CESA-2010:0825"]}, {"type": "cve", "idList": ["CVE-2010-2008", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"]}, {"type": "debian", "idList": ["DEBIAN:DSA-2143-1:3EA54", "DEBIAN:DSA-2143-1:90CDB"]}, {"type": "fedora", "idList": ["FEDORA:0D80C11115E", "FEDORA:1BD55110A79", "FEDORA:32B5F1112EF", "FEDORA:3C1241110D3"]}, {"type": "gentoo", "idList": ["GLSA-201201-02"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/LINUXRPM-RHSA-2010-0825/", "MSF:ILITIES/LINUXRPM-RHSA-2011-0164/"]}, {"type": "nessus", "idList": ["5588.PRM", "5646.PRM", "5968.PRM", "800790.PRM", "801120.PRM", "801140.PRM", "CENTOS_RHSA-2010-0824.NASL", "CENTOS_RHSA-2010-0825.NASL", "DEBIAN_DSA-2143.NASL", "FEDORA_2010-11126.NASL", "FEDORA_2010-11135.NASL", "FEDORA_2010-15147.NASL", "FEDORA_2010-15166.NASL", "GENTOO_GLSA-201201-02.NASL", "MACOSX_10_6_8.NASL", "MACOSX_SECUPD2011-004.NASL", "MANDRIVA_MDVSA-2010-155.NASL", "MANDRIVA_MDVSA-2010-222.NASL", "MANDRIVA_MDVSA-2011-012.NASL", "MYSQL_5_1_48.NASL", "MYSQL_5_1_49.NASL", "ORACLELINUX_ELSA-2010-0824.NASL", "ORACLELINUX_ELSA-2010-0825.NASL", "ORACLELINUX_ELSA-2011-0164.NASL", "REDHAT-RHSA-2010-0824.NASL", "REDHAT-RHSA-2010-0825.NASL", "REDHAT-RHSA-2011-0164.NASL", "SL_20101103_MYSQL_ON_SL4_X.NASL", "SL_20101103_MYSQL_ON_SL5_X.NASL", "SL_20110118_MYSQL_ON_SL6_X.NASL", "SUSE9_12661.NASL", "SUSE_11_1_LIBMYSQLCLIENT-DEVEL-100930.NASL", "SUSE_11_2_LIBMYSQLCLIENT-DEVEL-101006.NASL", "SUSE_11_LIBMYSQLCLIENT-DEVEL-100930.NASL", "SUSE_MYSQL-7172.NASL", "UBUNTU_USN-1017-1.NASL", "UBUNTU_USN-1397-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310100763", "OPENVAS:1361412562310100785", "OPENVAS:1361412562310122267", "OPENVAS:1361412562310122299", "OPENVAS:136141256231070803", "OPENVAS:1361412562310801380", "OPENVAS:1361412562310801566", "OPENVAS:1361412562310801567", "OPENVAS:1361412562310801568", "OPENVAS:1361412562310831134", "OPENVAS:1361412562310831243", "OPENVAS:1361412562310831244", "OPENVAS:1361412562310831315", "OPENVAS:1361412562310840533", "OPENVAS:1361412562310840944", "OPENVAS:1361412562310862290", "OPENVAS:1361412562310862300", "OPENVAS:1361412562310862444", "OPENVAS:1361412562310862676", "OPENVAS:1361412562310870356", "OPENVAS:1361412562310870357", "OPENVAS:1361412562310870736", "OPENVAS:1361412562310880452", "OPENVAS:1361412562310902466", "OPENVAS:70803", "OPENVAS:831134", "OPENVAS:831243", "OPENVAS:831244", "OPENVAS:831315", "OPENVAS:840533", "OPENVAS:840944", "OPENVAS:862290", "OPENVAS:862300", "OPENVAS:862444", "OPENVAS:862676", "OPENVAS:870356", "OPENVAS:870357", "OPENVAS:870736", "OPENVAS:880452", "OPENVAS:902466"]}, {"type": "oraclelinux", "idList": ["ELSA-2010-0824", "ELSA-2010-0825", "ELSA-2011-0164"]}, {"type": "redhat", "idList": ["RHSA-2010:0824", "RHSA-2010:0825", "RHSA-2011:0164"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:25125", "SECURITYVULNS:DOC:26596", "SECURITYVULNS:VULN:11243", "SECURITYVULNS:VULN:11754"]}, {"type": "ubuntu", "idList": ["USN-1017-1", "USN-1397-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2010-2008", "UB:CVE-2010-3677", "UB:CVE-2010-3678", "UB:CVE-2010-3679", "UB:CVE-2010-3680", "UB:CVE-2010-3681", "UB:CVE-2010-3682", "UB:CVE-2010-3683"]}]}, "backreferences": {"references": [{"type": "centos", "idList": ["CESA-2010:0824", "CESA-2010:0825"]}, {"type": "cve", "idList": ["CVE-2010-2008", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"]}, {"type": "fedora", "idList": ["FEDORA:0D80C11115E"]}, {"type": "nessus", "idList": ["FEDORA_2010-11126.NASL", "SUSE_11_1_LIBMYSQLCLIENT-DEVEL-100930.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310100763"]}, {"type": "oraclelinux", "idList": ["ELSA-2010-0824", "ELSA-2010-0825", "ELSA-2011-0164"]}, {"type": "redhat", "idList": ["RHSA-2010:0824", "RHSA-2010:0825", "RHSA-2011:0164"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:11754"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2010-3681"]}]}, "exploitation": null, "vulnersScore": 5.9}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647589307, "score": 0}}
{"nessus": [{"lastseen": "2021-08-19T13:03:21", "description": "Multiple vulnerabilities has been found and corrected in mysql :\n\nMySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service (server crash and database loss) via an ALTER DATABASE command with a #mysql50# string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which causes MySQL to move certain directories to the server data directory (CVE-2010-2008).\n\nAdditionally many security issues noted in the 5.1.49 release notes has been addressed with this advisory as well, such as :\n\n - LOAD DATA INFILE did not check for SQL errors and sent an OK packet even when errors were already reported.\n Also, an assert related to client-server protocol checking in debug servers sometimes was raised when it should not have been. (Bug#52512) (CVE-2010-3683)\n\n - Using EXPLAIN with queries of the form SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...) could cause a server crash. (Bug#52711) (CVE-2010-3682)\n\n - The server could crash if there were alternate reads from two indexes on a table using the HANDLER interface.\n (Bug#54007) (CVE-2010-3681)\n\n - A malformed argument to the BINLOG statement could result in Valgrind warnings or a server crash.\n (Bug#54393) (CVE-2010-3679)\n\n - Incorrect handling of NULL arguments could lead to a crash for IN() or CASE operations when NULL arguments were either passed explicitly as arguments (for IN()) or implicitly generated by the WITH ROLLUP modifier (for IN() and CASE). (Bug#54477) (CVE-2010-3678)\n\n - Joins involving a table with with a unique SET column could cause a server crash. (Bug#54575) (CVE-2010-3677)\n\n - Use of TEMPORARY InnoDB tables with nullable columns could cause a server crash. (Bug#54044) (CVE-2010-3680)\n\nThe updated packages have been patched to correct these issues.\n\nUpdate :\n\nPackages for 2009.1 was not provided with the MDVSA-2010:155 advisory.\nThis advisory provides the missing packages.", "cvss3": {"score": null, "vector": null}, "published": "2010-08-23T00:00:00", "type": "nessus", "title": "Mandriva Linux Security Advisory : mysql (MDVSA-2010:155-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:lib64mysql-devel", "p-cpe:/a:mandriva:linux:lib64mysql-static-devel", "p-cpe:/a:mandriva:linux:lib64mysql16", "p-cpe:/a:mandriva:linux:libmysql-devel", "p-cpe:/a:mandriva:linux:libmysql-static-devel", "p-cpe:/a:mandriva:linux:libmysql16", "p-cpe:/a:mandriva:linux:mysql", "p-cpe:/a:mandriva:linux:mysql-bench", "p-cpe:/a:mandriva:linux:mysql-client", "p-cpe:/a:mandriva:linux:mysql-common", "p-cpe:/a:mandriva:linux:mysql-doc", "p-cpe:/a:mandriva:linux:mysql-max", "p-cpe:/a:mandriva:linux:mysql-ndb-extra", "p-cpe:/a:mandriva:linux:mysql-ndb-management", "p-cpe:/a:mandriva:linux:mysql-ndb-storage", "p-cpe:/a:mandriva:linux:mysql-ndb-tools", "cpe:/o:mandriva:linux:2009.1"], "id": "MANDRIVA_MDVSA-2010-155.NASL", "href": "https://www.tenable.com/plugins/nessus/48399", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2010:155. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(48399);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2010-2008\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\");\n script_bugtraq_id(41198, 42596, 42598, 42599, 42625, 42633, 42638, 42646);\n script_xref(name:\"MDVSA\", value:\"2010:155-1\");\n\n script_name(english:\"Mandriva Linux Security Advisory : mysql (MDVSA-2010:155-1)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities has been found and corrected in mysql :\n\nMySQL before 5.1.48 allows remote authenticated users with alter\ndatabase privileges to cause a denial of service (server crash and\ndatabase loss) via an ALTER DATABASE command with a #mysql50# string\nfollowed by a . (dot), .. (dot dot), ../ (dot dot slash) or similar\nsequence, and an UPGRADE DATA DIRECTORY NAME command, which causes\nMySQL to move certain directories to the server data directory\n(CVE-2010-2008).\n\nAdditionally many security issues noted in the 5.1.49 release notes\nhas been addressed with this advisory as well, such as :\n\n - LOAD DATA INFILE did not check for SQL errors and sent\n an OK packet even when errors were already reported.\n Also, an assert related to client-server protocol\n checking in debug servers sometimes was raised when it\n should not have been. (Bug#52512) (CVE-2010-3683)\n\n - Using EXPLAIN with queries of the form SELECT ... UNION\n ... ORDER BY (SELECT ... WHERE ...) could cause a server\n crash. (Bug#52711) (CVE-2010-3682)\n\n - The server could crash if there were alternate reads\n from two indexes on a table using the HANDLER interface.\n (Bug#54007) (CVE-2010-3681)\n\n - A malformed argument to the BINLOG statement could\n result in Valgrind warnings or a server crash.\n (Bug#54393) (CVE-2010-3679)\n\n - Incorrect handling of NULL arguments could lead to a\n crash for IN() or CASE operations when NULL arguments\n were either passed explicitly as arguments (for IN()) or\n implicitly generated by the WITH ROLLUP modifier (for\n IN() and CASE). (Bug#54477) (CVE-2010-3678)\n\n - Joins involving a table with with a unique SET column\n could cause a server crash. (Bug#54575) (CVE-2010-3677)\n\n - Use of TEMPORARY InnoDB tables with nullable columns\n could cause a server crash. (Bug#54044) (CVE-2010-3680)\n\nThe updated packages have been patched to correct these issues.\n\nUpdate :\n\nPackages for 2009.1 was not provided with the MDVSA-2010:155 advisory.\nThis advisory provides the missing packages.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=52512\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=52711\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=54007\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=54044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=54393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=54477\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=54575\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64mysql-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64mysql16\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libmysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libmysql-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libmysql16\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-max\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-ndb-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-ndb-management\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-ndb-storage\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-ndb-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/08/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"lib64mysql-devel-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"lib64mysql-static-devel-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"lib64mysql16-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"libmysql-devel-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"libmysql-static-devel-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"libmysql16-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"mysql-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"mysql-bench-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"mysql-client-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"mysql-common-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"mysql-doc-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"mysql-max-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"mysql-ndb-extra-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"mysql-ndb-management-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"mysql-ndb-storage-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"mysql-ndb-tools-5.1.42-0.6mdv2009.1\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:03:07", "description": "Versions of MySQL Community Server 5.1 earlier than 5.1.49 are potentially affected by multiple vulnerabilities :\n\n - After changing the values of the 'innodb_file_format' or 'innodb_file_per_table' configuration parameters, DDL statements could cause a server crash. (Bug #55039)\n\nJoins involving a table with a unique SET column could cause a server crash. (Bug #54575)\n\nIncorrect handling of NULL arguments could lead to a crash for IN() or CASE operations when ULL arguments were either passed explicitly as arguments (for IN()) or implicitly generated by the WITH ROLLUP modifier which could lead to a crash. (Bug #54477)\n\n - A malformed argument to the BINLOG statement could result in Valgrind warnings or a server crash. (Bug #54393)\n\n - Use of TEMPORARY InnoDB tables with nullabale columns could cause a server crash. (Bug #54044)\n\n - The server could crash if there were alternate reads from two indexes on a table using the HANDLER interface. (Bug #54007)\n\n - Using EXPLAIN with specially crafted queries could lead to a crash. (Bug #52711)\n\n - 'LOAD DATA INFILE' did not check for SQL errors and sent an OK packet even when errors were already reported. (Bug #52512)", "cvss3": {"score": 5.3, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}, "published": "2010-08-24T00:00:00", "type": "nessus", "title": "MySQL Community Server 5.1 < 5.1.49 Multiple Denial of Service Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-3683", "CVE-2010-3676"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:a:mysql:community_server:*:*:*:*:*:*:*:*"], "id": "5646.PRM", "href": "https://www.tenable.com/plugins/nnm/5646", "sourceData": "Binary data 5646.prm", "cvss": {"score": 5, "vector": "CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:03:06", "description": "Update to mysql 5.1.50, for numerous bug fixes including some low-grade security issues.\n\nSee upstream release notes at :\n\n - http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html\n\n - http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.htm l\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2010-10-06T00:00:00", "type": "nessus", "title": "Fedora 13 : mysql-5.1.50-2.fc13 (2010-15166)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3676", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:mysql", "cpe:/o:fedoraproject:fedora:13"], "id": "FEDORA_2010-15166.NASL", "href": "https://www.tenable.com/plugins/nessus/49727", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2010-15166.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(49727);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2010-3676\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\");\n script_bugtraq_id(42596, 42598, 42599, 42625, 42633, 42638, 42643, 42646, 43677);\n script_xref(name:\"FEDORA\", value:\"2010-15166\");\n\n script_name(english:\"Fedora 13 : mysql-5.1.50-2.fc13 (2010-15166)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to mysql 5.1.50, for numerous bug fixes including some\nlow-grade security issues.\n\nSee upstream release notes at :\n\n - http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html\n\n -\n http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.htm\n l\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html\"\n );\n # http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628040\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628172\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628192\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628328\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628680\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628698\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2010-October/048788.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f3e2d6be\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected mysql package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:13\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/09/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/10/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^13([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 13.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC13\", reference:\"mysql-5.1.50-2.fc13\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql\");\n}\n", "cvss": {"score": 4, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-10-16T15:26:29", "description": "The version of MySQL Community Server installed on the remote host is earlier than 5.1.49 and thus potentially affected by multiple vulnerabilities:\n\n - DDL statements could cause the server to crash. (55039)\n\n - Joins involving a table with a unique SET column could cause the server to crash. (54575)\n\n - Incorrect handling of NULL arguments for IN or CASE operations involving the WITH ROLLUP modifier could cause the server to crash. (54477)\n\n - A malformed argument to the BINLOG statement could cause the server to crash. (54393)\n\n - Using TEMPORARY InnoDB tables with nullable columns could cause the server to crash. (54044)\n\n - Alternate reads with two indexes on a table using the HANDLER interface could cause the server to crash.\n (54007)\n\n - Using EXPLAIN with queries of the form SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...) could cause the server to crash. (52711)\n\n - LOAD DATA INFILE did not check for SQL errors sent and even if errors were already reported, it sent an OK packet. Also, an assert was sometimes raised when it should not have been relating to client-server protocol checking in debug servers. (52512)", "cvss3": {"score": null, "vector": null}, "published": "2010-08-26T00:00:00", "type": "nessus", "title": "MySQL Community Server < 5.1.49 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3676", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"], "modified": "2018-11-15T00:00:00", "cpe": ["cpe:/a:mysql:mysql"], "id": "MYSQL_5_1_49.NASL", "href": "https://www.tenable.com/plugins/nessus/48759", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(48759);\n script_version(\"1.12\");\n script_cvs_date(\"Date: 2018/11/15 20:50:21\");\n\n script_cve_id(\n \"CVE-2010-3676\",\n \"CVE-2010-3677\",\n \"CVE-2010-3678\",\n \"CVE-2010-3679\",\n \"CVE-2010-3680\",\n \"CVE-2010-3681\",\n \"CVE-2010-3682\",\n \"CVE-2010-3683\"\n );\n script_bugtraq_id(42596, 42598, 42599, 42625, 42633, 42638, 42643, 42646);\n script_xref(name:\"Secunia\", value:\"41048\");\n\n script_name(english:\"MySQL Community Server < 5.1.49 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of MySQL 5.1 Server\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"The remote database server is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of MySQL Community Server installed on the remote host is\nearlier than 5.1.49 and thus potentially affected by multiple\nvulnerabilities:\n\n - DDL statements could cause the server to crash. (55039)\n\n - Joins involving a table with a unique SET column could\n cause the server to crash. (54575)\n\n - Incorrect handling of NULL arguments for IN or CASE\n operations involving the WITH ROLLUP modifier could\n cause the server to crash. (54477)\n\n - A malformed argument to the BINLOG statement could\n cause the server to crash. (54393)\n\n - Using TEMPORARY InnoDB tables with nullable columns\n could cause the server to crash. (54044)\n\n - Alternate reads with two indexes on a table using the\n HANDLER interface could cause the server to crash.\n (54007)\n\n - Using EXPLAIN with queries of the form SELECT ... UNION\n ... ORDER BY (SELECT ... WHERE ...) could cause the\n server to crash. (52711)\n\n - LOAD DATA INFILE did not check for SQL errors sent and\n even if errors were already reported, it sent an OK\n packet. Also, an assert was sometimes raised when it\n should not have been relating to client-server protocol\n checking in debug servers. (52512)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.mysql.com/bug.php?id=55039\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.mysql.com/bug.php?id=55475\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.mysql.com/bug.php?id=54477\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.mysql.com/bug.php?id=54393\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.mysql.com/bug.php?id=54044\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.mysql.com/bug.php?id=54007\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.mysql.com/bug.php?id=52711\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.mysql.com/bug.php?id=52512\");\n script_set_attribute(attribute:\"see_also\", value:\"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to MySQL Community Server 5.1.49 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/07/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/07/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/08/26\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mysql:mysql\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Databases\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mysql_version.nasl\", \"mysql_login.nasl\");\n script_require_keys(\"Settings/ParanoidReport\");\n script_require_ports(\"Services/mysql\", 3306);\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"mysql_func.inc\");\n\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\n\nport = get_service(svc:\"mysql\", default:3306, exit_on_fail:TRUE);\nvuln = FALSE;\n\nif (mysql_init(port:port, exit_on_fail:TRUE) == 1)\n{\n variant = mysql_get_variant();\n version = mysql_get_version();\n ver_fields = split(version, sep:'.', keep:FALSE);\n major = int(ver_fields[0]);\n minor = int(ver_fields[1]);\n rev = int(ver_fields[2]);\n\n if (\n !isnull(variant) && \"Community\" >< variant &&\n strlen(version) &&\n major == 5 && minor == 1 && rev < 49\n ) vuln = TRUE;\n\n}\nelse exit(1, \"Can't establish a MySQL connection on port \"+port+\".\");\nmysql_close();\n\nif (vuln)\n{\n if (report_verbosity > 0)\n {\n report = '\\n Installed version : ' + version +\n '\\n Fixed version : 5.1.49\\n';\n datadir = get_kb_item('mysql/' + port + '/datadir');\n if (!empty_or_null(datadir))\n {\n report += ' Data Dir : ' + datadir + '\\n';\n }\n databases = get_kb_item('mysql/' + port + '/databases');\n if (!empty_or_null(databases))\n { \n report += ' Databases :\\n' + databases;\n }\n security_warning(port:port, extra:report);\n }\n else security_warning(port);\n exit(0);\n}\nelse\n{\n if (isnull(variant)) exit(1, \"Can't determine the variant of MySQL listening on port \"+port+\".\");\n else if (\"Community\" >< variant) exit(0, \"MySQL version \"+version+\" is listening on port \"+port+\" and is not affected.\");\n else exit(0, \"MySQL \"+variant+\" is listening on port \"+port+\" and is not affected.\");\n}\n", "cvss": {"score": 4, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:02:51", "description": "Update to mysql 5.1.50, for numerous bug fixes including some low-grade security issues.\n\nSee upstream release notes at :\n\n - http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html\n\n - http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.htm l\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2010-10-06T00:00:00", "type": "nessus", "title": "Fedora 14 : mysql-5.1.50-2.fc14 (2010-15147)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3676", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:mysql", "cpe:/o:fedoraproject:fedora:14"], "id": "FEDORA_2010-15147.NASL", "href": "https://www.tenable.com/plugins/nessus/49726", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2010-15147.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(49726);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2010-3676\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\");\n script_bugtraq_id(42596, 42598, 42599, 42625, 42633, 42638, 42643, 42646, 43677);\n script_xref(name:\"FEDORA\", value:\"2010-15147\");\n\n script_name(english:\"Fedora 14 : mysql-5.1.50-2.fc14 (2010-15147)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to mysql 5.1.50, for numerous bug fixes including some\nlow-grade security issues.\n\nSee upstream release notes at :\n\n - http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html\n\n -\n http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.htm\n l\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html\"\n );\n # http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628040\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628172\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628192\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628328\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628680\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628698\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2010-October/048881.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?52e2458d\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected mysql package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:14\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/09/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/10/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^14([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 14.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC14\", reference:\"mysql-5.1.50-2.fc14\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql\");\n}\n", "cvss": {"score": 4, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:03:07", "description": "Versions of MySQL Community Server 5.1 earlier than 5.1.49 are potentially affected by multiple vulnerabilities :\n\n - After changing the values of the 'innodb_file_format' or 'innodb_file_per_table' configuration parameters, DDL statements could cause a server crash. (Bug #55039)\n\nJoins involving a table with a unique SET column could cause a server crash. (Bug #54575)\n\nIncorrect handling of NULL arguments could lead to a crash for IN() or CASE operations when ULL arguments were either passed explicitly as arguments (for IN()) or implicitly generated by the WITH ROLLUP modifier which could lead to a crash. (Bug #54477)\n\n - A malformed argument to the BINLOG statement could result in Valgrind warnings or a server crash. (Bug #54393)\n\n - Use of TEMPORARY InnoDB tables with nullabale columns could cause a server crash. (Bug #54044)\n\n - The server could crash if there were alternate reads from two indexes on a table using the HANDLER interface. (Bug #54007)\n\n - Using EXPLAIN with specially crafted queries could lead to a crash. (Bug #52711)\n\n - 'LOAD DATA INFILE' did not check for SQL errors and sent an OK packet even when errors were already reported. (Bug #52512)", "cvss3": {"score": null, "vector": null}, "published": "2010-08-24T00:00:00", "type": "nessus", "title": "MySQL Community Server 5.1 < 5.1.49 Multiple Denial of Service Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-3683", "CVE-2010-3676"], "modified": "2010-08-24T00:00:00", "cpe": [], "id": "801140.PRM", "href": "https://www.tenable.com/plugins/lce/801140", "sourceData": "Binary data 801140.prm", "cvss": {"score": 5, "vector": "CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:01:53", "description": "Multiple vulnerabilities has been found and corrected in mysql :\n\nstorage/innobase/dict/dict0crea.c in mysqld in MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (assertion failure) by modifying the (1) innodb_file_format or (2) innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement (CVE-2010-3676).\n\nMySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column (CVE-2010-3677).\n\nMySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier (CVE-2010-3678).\n\nMySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via certain arguments to the BINLOG command, which triggers an access of uninitialized memory, as demonstrated by valgrind (CVE-2010-3679).\n\nMySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables while using InnoDB, which triggers an assertion failure (CVE-2010-3680).\n\nMySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing alternate reads from two indexes on a table, which triggers an assertion failure (CVE-2010-3681).\n\nMySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted 'SELECT ... UNION ... ORDER BY \\(SELECT ... WHERE ...\\)' statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function (CVE-2010-3682).\n\nMySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request (CVE-2010-3683).\n\nThe updated packages have been upgraded to the latest (last) stable 5.1 release (5.1.54) to address these issues for both Mandriva Linux 2010.0 and 2010.2.", "cvss3": {"score": null, "vector": null}, "published": "2011-01-28T00:00:00", "type": "nessus", "title": "Mandriva Linux Security Advisory : mysql (MDVSA-2011:012)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3676", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:lib64mysql-devel", "p-cpe:/a:mandriva:linux:lib64mysql-static-devel", "p-cpe:/a:mandriva:linux:lib64mysql16", "p-cpe:/a:mandriva:linux:libmysql-devel", "p-cpe:/a:mandriva:linux:libmysql-static-devel", "p-cpe:/a:mandriva:linux:libmysql16", "p-cpe:/a:mandriva:linux:mysql", "p-cpe:/a:mandriva:linux:mysql-bench", "p-cpe:/a:mandriva:linux:mysql-client", "p-cpe:/a:mandriva:linux:mysql-common", "p-cpe:/a:mandriva:linux:mysql-common-core", "p-cpe:/a:mandriva:linux:mysql-core", "p-cpe:/a:mandriva:linux:mysql-doc", "p-cpe:/a:mandriva:linux:mysql-max", "p-cpe:/a:mandriva:linux:mysql-ndb-extra", "p-cpe:/a:mandriva:linux:mysql-ndb-management", "p-cpe:/a:mandriva:linux:mysql-ndb-storage", "p-cpe:/a:mandriva:linux:mysql-ndb-tools", "p-cpe:/a:mandriva:linux:mysql-plugin_pbxt", "p-cpe:/a:mandriva:linux:mysql-plugin_pinba", "p-cpe:/a:mandriva:linux:mysql-plugin_revision", "p-cpe:/a:mandriva:linux:mysql-plugin_sphinx", "cpe:/o:mandriva:linux:2010.0", "cpe:/o:mandriva:linux:2010.1"], "id": "MANDRIVA_MDVSA-2011-012.NASL", "href": "https://www.tenable.com/plugins/nessus/51804", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2011:012. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51804);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2010-3676\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\");\n script_bugtraq_id(42596, 42598, 42599, 42625, 42633, 42638, 42643, 42646);\n script_xref(name:\"MDVSA\", value:\"2011:012\");\n\n script_name(english:\"Mandriva Linux Security Advisory : mysql (MDVSA-2011:012)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities has been found and corrected in mysql :\n\nstorage/innobase/dict/dict0crea.c in mysqld in MySQL 5.1 before 5.1.49\nallows remote authenticated users to cause a denial of service\n(assertion failure) by modifying the (1) innodb_file_format or (2)\ninnodb_file_per_table configuration parameters for the InnoDB storage\nengine, then executing a DDL statement (CVE-2010-3676).\n\nMySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote\nauthenticated users to cause a denial of service (mysqld daemon crash)\nvia a join query that uses a table with a unique SET column\n(CVE-2010-3677).\n\nMySQL 5.1 before 5.1.49 allows remote authenticated users to cause a\ndenial of service (crash) via (1) IN or (2) CASE operations with NULL\narguments that are explicitly specified or indirectly provided by the\nWITH ROLLUP modifier (CVE-2010-3678).\n\nMySQL 5.1 before 5.1.49 allows remote authenticated users to cause a\ndenial of service (mysqld daemon crash) via certain arguments to the\nBINLOG command, which triggers an access of uninitialized memory, as\ndemonstrated by valgrind (CVE-2010-3679).\n\nMySQL 5.1 before 5.1.49 allows remote authenticated users to cause a\ndenial of service (mysqld daemon crash) by creating temporary tables\nwhile using InnoDB, which triggers an assertion failure\n(CVE-2010-3680).\n\nMySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote\nauthenticated users to cause a denial of service (mysqld daemon crash)\nby using the HANDLER interface and performing alternate reads from two\nindexes on a table, which triggers an assertion failure\n(CVE-2010-3681).\n\nMySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote\nauthenticated users to cause a denial of service (mysqld daemon crash)\nby using EXPLAIN with crafted 'SELECT ... UNION ... ORDER BY \\(SELECT\n... WHERE ...\\)' statements, which triggers a NULL pointer dereference\nin the Item_singlerow_subselect::store function (CVE-2010-3682).\n\nMySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a\nLOAD DATA INFILE request generates SQL errors, which allows remote\nauthenticated users to cause a denial of service (mysqld daemon crash)\nvia a crafted request (CVE-2010-3683).\n\nThe updated packages have been upgraded to the latest (last) stable\n5.1 release (5.1.54) to address these issues for both Mandriva Linux\n2010.0 and 2010.2.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-54.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mysql.com/support/eol-notice.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64mysql-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64mysql16\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libmysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libmysql-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libmysql16\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-common-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-max\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-ndb-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-ndb-management\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-ndb-storage\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-ndb-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-plugin_pbxt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-plugin_pinba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-plugin_revision\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-plugin_sphinx\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/28\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64mysql-devel-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64mysql-static-devel-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64mysql16-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libmysql-devel-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libmysql-static-devel-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libmysql16-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mysql-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mysql-bench-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mysql-client-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mysql-common-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mysql-common-core-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mysql-core-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mysql-doc-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mysql-max-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mysql-ndb-extra-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mysql-ndb-management-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mysql-ndb-storage-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mysql-ndb-tools-5.1.54-0.1mdv2010.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64mysql-devel-5.1.54-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64mysql-static-devel-5.1.54-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64mysql16-5.1.54-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libmysql-devel-5.1.54-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libmysql-static-devel-5.1.54-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libmysql16-5.1.54-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mysql-5.1.54-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mysql-bench-5.1.54-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mysql-client-5.1.54-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mysql-common-5.1.54-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mysql-common-core-5.1.54-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mysql-core-5.1.54-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mysql-plugin_pbxt-1.0.11-13.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mysql-plugin_pinba-0.0.5-13.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mysql-plugin_revision-0.1-13.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mysql-plugin_sphinx-0.9.9-13.1mdv2010.2\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:02:36", "description": "- local users could delete data files for tables of other users (CVE-2010-1626).\n\n - authenticated users could gather information for tables they should not have access to (CVE-2010-1849)\n\n - authenticated users could crash mysqld (CVE-2010-1848)\n\n - authenticated users could potentially execute arbitrary code as the user running mysqld (CVE-2010-1850)\n\n - authenticated users could crash mysqld (CVE-2010-3676, CVE-2010-3677, CVE-2010-3678, CVE-2010-3679, CVE-2010-3680, CVE-2010-3681, CVE-2010-3682, CVE-2010-3683, CVE-2010-2008)\n\n - a race condition in /etc/init.d/mysql allowed local users to make any file readable via symlink in /var/tmp (CVE-2010-3675)", "cvss3": {"score": null, "vector": null}, "published": "2010-10-18T00:00:00", "type": "nessus", "title": "openSUSE Security Update : libmysqlclient-devel (openSUSE-SU-2010:0730-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1621", "CVE-2010-1626", "CVE-2010-1848", "CVE-2010-1849", "CVE-2010-1850", "CVE-2010-2008", "CVE-2010-3675", "CVE-2010-3676", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libmysqlclient-devel", "p-cpe:/a:novell:opensuse:libmysqlclient16", "p-cpe:/a:novell:opensuse:libmysqlclient16-32bit", "p-cpe:/a:novell:opensuse:libmysqlclient_r16", "p-cpe:/a:novell:opensuse:libmysqlclient_r16-32bit", "p-cpe:/a:novell:opensuse:libmysqld-devel", "p-cpe:/a:novell:opensuse:mysql", "p-cpe:/a:novell:opensuse:mysql-bench", "p-cpe:/a:novell:opensuse:mysql-client", "p-cpe:/a:novell:opensuse:mysql-debug", "p-cpe:/a:novell:opensuse:mysql-ndb-extra", "p-cpe:/a:novell:opensuse:mysql-ndb-management", "p-cpe:/a:novell:opensuse:mysql-ndb-storage", "p-cpe:/a:novell:opensuse:mysql-ndb-tools", "p-cpe:/a:novell:opensuse:mysql-test", "p-cpe:/a:novell:opensuse:mysql-tools", "cpe:/o:novell:opensuse:11.2"], "id": "SUSE_11_2_LIBMYSQLCLIENT-DEVEL-101006.NASL", "href": "https://www.tenable.com/plugins/nessus/50016", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update libmysqlclient-devel-3260.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50016);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-1621\", \"CVE-2010-1626\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2010-2008\", \"CVE-2010-3675\", \"CVE-2010-3676\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\");\n\n script_name(english:\"openSUSE Security Update : libmysqlclient-devel (openSUSE-SU-2010:0730-1)\");\n script_summary(english:\"Check for the libmysqlclient-devel-3260 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - local users could delete data files for tables of other\n users (CVE-2010-1626).\n\n - authenticated users could gather information for tables\n they should not have access to (CVE-2010-1849)\n\n - authenticated users could crash mysqld (CVE-2010-1848)\n\n - authenticated users could potentially execute arbitrary\n code as the user running mysqld (CVE-2010-1850)\n\n - authenticated users could crash mysqld (CVE-2010-3676,\n CVE-2010-3677, CVE-2010-3678, CVE-2010-3679,\n CVE-2010-3680, CVE-2010-3681, CVE-2010-3682,\n CVE-2010-3683, CVE-2010-2008)\n\n - a race condition in /etc/init.d/mysql allowed local\n users to make any file readable via symlink in /var/tmp\n (CVE-2010-3675)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=582656\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=607466\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=609551\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=637499\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2010-10/msg00018.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libmysqlclient-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'White_Phosphorus');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmysqlclient-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmysqlclient16\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmysqlclient16-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmysqlclient_r16\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmysqlclient_r16-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmysqld-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-ndb-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-ndb-management\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-ndb-storage\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-ndb-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/10/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/10/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.2\", reference:\"libmysqlclient-devel-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"libmysqlclient16-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"libmysqlclient_r16-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"libmysqld-devel-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"mysql-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"mysql-bench-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"mysql-client-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"mysql-debug-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"mysql-ndb-extra-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"mysql-ndb-management-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"mysql-ndb-storage-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"mysql-ndb-tools-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"mysql-test-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"mysql-tools-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", cpu:\"x86_64\", reference:\"libmysqlclient16-32bit-5.1.49-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", cpu:\"x86_64\", reference:\"libmysqlclient_r16-32bit-5.1.49-0.1.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libmysqlclient-devel / libmysqlclient16 / libmysqlclient16-32bit / etc\");\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:02:18", "description": "The following bugs have been fixed :\n\n - local users could delete data files for tables of other users. (CVE-2010-1626)\n\n - authenticated users could gather information for tables they should not have access to. (CVE-2010-1849)\n\n - authenticated users could crash mysqld. (CVE-2010-1848)\n\n - authenticated users could potentially execute arbitrary code as the user running mysqld. (CVE-2010-1850)\n\n - authenticated users could crash mysqld (CVE-2010-3677 / CVE-2010-3678 / CVE-2010-3681 / CVE-2010-3682 / CVE-2010-3683)", "cvss3": {"score": null, "vector": null}, "published": "2010-12-02T00:00:00", "type": "nessus", "title": "SuSE 11 / 11.1 Security Update : MySQL (SAT Patch Numbers 3220 / 3243)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1626", "CVE-2010-1848", "CVE-2010-1849", "CVE-2010-1850", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:11:libmysqlclient15", "p-cpe:/a:novell:suse_linux:11:libmysqlclient15-32bit", "p-cpe:/a:novell:suse_linux:11:libmysqlclient_r15", "p-cpe:/a:novell:suse_linux:11:libmysqlclient_r15-32bit", "p-cpe:/a:novell:suse_linux:11:mysql", "p-cpe:/a:novell:suse_linux:11:mysql-Max", "p-cpe:/a:novell:suse_linux:11:mysql-client", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_11_LIBMYSQLCLIENT-DEVEL-100930.NASL", "href": "https://www.tenable.com/plugins/nessus/50936", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50936);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-1626\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\");\n\n script_name(english:\"SuSE 11 / 11.1 Security Update : MySQL (SAT Patch Numbers 3220 / 3243)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The following bugs have been fixed :\n\n - local users could delete data files for tables of other\n users. (CVE-2010-1626)\n\n - authenticated users could gather information for tables\n they should not have access to. (CVE-2010-1849)\n\n - authenticated users could crash mysqld. (CVE-2010-1848)\n\n - authenticated users could potentially execute arbitrary\n code as the user running mysqld. (CVE-2010-1850)\n\n - authenticated users could crash mysqld (CVE-2010-3677 /\n CVE-2010-3678 / CVE-2010-3681 / CVE-2010-3682 /\n CVE-2010-3683)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=607466\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=609551\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=637499\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1626.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1848.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1849.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1850.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-3677.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-3678.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-3681.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-3682.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-3683.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Apply SAT patch number 3220 / 3243 as appropriate.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'White_Phosphorus');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libmysqlclient15\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libmysqlclient15-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libmysqlclient_r15\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libmysqlclient_r15-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mysql-Max\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mysql-client\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/09/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/12/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"libmysqlclient15-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"libmysqlclient_r15-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"mysql-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"mysql-client-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libmysqlclient15-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libmysqlclient15-32bit-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libmysqlclient_r15-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libmysqlclient_r15-32bit-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mysql-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mysql-client-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"i586\", reference:\"libmysqlclient15-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"i586\", reference:\"libmysqlclient_r15-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"i586\", reference:\"mysql-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"i586\", reference:\"mysql-client-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"libmysqlclient15-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"libmysqlclient15-32bit-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"libmysqlclient_r15-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"libmysqlclient_r15-32bit-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"mysql-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"mysql-client-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"libmysqlclient15-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"libmysqlclient_r15-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"mysql-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"mysql-Max-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"mysql-client-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"libmysqlclient15-32bit-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"libmysqlclient15-32bit-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"libmysqlclient15-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"libmysqlclient_r15-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"mysql-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"mysql-Max-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"mysql-client-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, cpu:\"s390x\", reference:\"libmysqlclient15-32bit-5.0.67-13.26.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, cpu:\"x86_64\", reference:\"libmysqlclient15-32bit-5.0.67-13.26.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:02:33", "description": "The following bugs have been fixed :\n\n - local users could delete data files for tables of other users. (CVE-2010-1626)\n\n - authenticated users could gather information for tables they should not have access to. (CVE-2010-1849)\n\n - authenticated users could crash mysqld. (CVE-2010-1848)\n\n - authenticated users could potentially execute arbitrary code as the user running mysqld. (CVE-2010-1850)\n\n - authenticated users could crash mysqld (CVE-2010-3677 / CVE-2010-3678 / CVE-2010-3681 / CVE-2010-3682 / CVE-2010-3683)", "cvss3": {"score": null, "vector": null}, "published": "2010-10-18T00:00:00", "type": "nessus", "title": "SuSE 10 Security Update : MySQL (ZYPP Patch Number 7172)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1626", "CVE-2010-1848", "CVE-2010-1849", "CVE-2010-1850", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"], "modified": "2021-01-14T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_MYSQL-7172.NASL", "href": "https://www.tenable.com/plugins/nessus/50021", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50021);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-1626\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\");\n\n script_name(english:\"SuSE 10 Security Update : MySQL (ZYPP Patch Number 7172)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The following bugs have been fixed :\n\n - local users could delete data files for tables of other\n users. (CVE-2010-1626)\n\n - authenticated users could gather information for tables\n they should not have access to. (CVE-2010-1849)\n\n - authenticated users could crash mysqld. (CVE-2010-1848)\n\n - authenticated users could potentially execute arbitrary\n code as the user running mysqld. (CVE-2010-1850)\n\n - authenticated users could crash mysqld (CVE-2010-3677 /\n CVE-2010-3678 / CVE-2010-3681 / CVE-2010-3682 /\n CVE-2010-3683)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1626.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1848.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1849.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1850.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-3677.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-3678.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-3681.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-3682.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-3683.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 7172.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'White_Phosphorus');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/09/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/10/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"mysql-5.0.26-12.29.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"mysql-client-5.0.26-12.29.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"mysql-devel-5.0.26-12.29.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"mysql-shared-5.0.26-12.29.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:3, cpu:\"x86_64\", reference:\"mysql-shared-32bit-5.0.26-12.29.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"mysql-5.0.26-12.29.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"mysql-Max-5.0.26-12.29.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"mysql-client-5.0.26-12.29.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"mysql-devel-5.0.26-12.29.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"mysql-shared-5.0.26-12.29.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, cpu:\"x86_64\", reference:\"mysql-shared-32bit-5.0.26-12.29.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:02:44", "description": "- local users could delete data files for tables of other users (CVE-2010-1626).\n\n - authenticated users could gather information for tables they should not have access to (CVE-2010-1849)\n\n - authenticated users could crash mysqld (CVE-2010-1848)\n\n - authenticated users could potentially execute arbitrary code as the user running mysqld (CVE-2010-1850)\n\n - authenticated users could crash mysqld (CVE-2010-3677, CVE-2010-3678, CVE-2010-3681, CVE-2010-3682, CVE-2010-3683)", "cvss3": {"score": null, "vector": null}, "published": "2010-10-18T00:00:00", "type": "nessus", "title": "openSUSE Security Update : libmysqlclient-devel (openSUSE-SU-2010:0731-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1626", "CVE-2010-1848", "CVE-2010-1849", "CVE-2010-1850", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libmysqlclient-devel", "p-cpe:/a:novell:opensuse:libmysqlclient15", "p-cpe:/a:novell:opensuse:libmysqlclient15-32bit", "p-cpe:/a:novell:opensuse:libmysqlclient_r15", "p-cpe:/a:novell:opensuse:libmysqlclient_r15-32bit", "p-cpe:/a:novell:opensuse:mysql", "p-cpe:/a:novell:opensuse:mysql-Max", "p-cpe:/a:novell:opensuse:mysql-bench", "p-cpe:/a:novell:opensuse:mysql-client", "p-cpe:/a:novell:opensuse:mysql-debug", "p-cpe:/a:novell:opensuse:mysql-test", "p-cpe:/a:novell:opensuse:mysql-tools", "cpe:/o:novell:opensuse:11.1"], "id": "SUSE_11_1_LIBMYSQLCLIENT-DEVEL-100930.NASL", "href": "https://www.tenable.com/plugins/nessus/50010", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update libmysqlclient-devel-3232.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50010);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-1626\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\");\n\n script_name(english:\"openSUSE Security Update : libmysqlclient-devel (openSUSE-SU-2010:0731-1)\");\n script_summary(english:\"Check for the libmysqlclient-devel-3232 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - local users could delete data files for tables of other\n users (CVE-2010-1626).\n\n - authenticated users could gather information for tables\n they should not have access to (CVE-2010-1849)\n\n - authenticated users could crash mysqld (CVE-2010-1848)\n\n - authenticated users could potentially execute arbitrary\n code as the user running mysqld (CVE-2010-1850)\n\n - authenticated users could crash mysqld (CVE-2010-3677,\n CVE-2010-3678, CVE-2010-3681, CVE-2010-3682,\n CVE-2010-3683)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=557669\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=567977\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=607466\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=609551\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=637499\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2010-10/msg00019.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libmysqlclient-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'White_Phosphorus');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmysqlclient-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmysqlclient15\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmysqlclient15-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmysqlclient_r15\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmysqlclient_r15-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-Max\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mysql-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/09/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/10/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libmysqlclient-devel-5.0.67-12.18.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libmysqlclient15-5.0.67-12.18.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libmysqlclient_r15-5.0.67-12.18.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mysql-5.0.67-12.18.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mysql-Max-5.0.67-12.18.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mysql-bench-5.0.67-12.18.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mysql-client-5.0.67-12.18.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mysql-debug-5.0.67-12.18.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mysql-test-5.0.67-12.18.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mysql-tools-5.0.67-12.18.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"libmysqlclient15-32bit-5.0.67-12.18.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"libmysqlclient_r15-32bit-5.0.67-12.18.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libmysqlclient-devel / libmysqlclient15 / libmysqlclient15-32bit / etc\");\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:01:52", "description": "Updated mysql packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nThe MySQL PolyFromWKB() function did not sanity check Well-Known Binary (WKB) data, which could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3840)\n\nA flaw in the way MySQL processed certain JOIN queries could allow a remote, authenticated attacker to cause excessive CPU use (up to 100%), if a stored procedure contained JOIN queries, and that procedure was executed twice in sequence. (CVE-2010-3839)\n\nA flaw in the way MySQL processed queries that provide a mixture of numeric and longblob data types to the LEAST or GREATEST function, could allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3838)\n\nA flaw in the way MySQL processed PREPARE statements containing both GROUP_CONCAT and the WITH ROLLUP modifier could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3837)\n\nMySQL did not properly pre-evaluate LIKE arguments in view prepare mode, possibly allowing a remote, authenticated attacker to crash mysqld. (CVE-2010-3836)\n\nA flaw in the way MySQL processed statements that assign a value to a user-defined variable and that also contain a logical value evaluation could allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3835)\n\nA flaw in the way MySQL evaluated the arguments of extreme-value functions, such as LEAST and GREATEST, could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3833)\n\nA flaw in the way MySQL handled LOAD DATA INFILE requests allowed MySQL to send OK packets even when there were errors. (CVE-2010-3683)\n\nA flaw in the way MySQL processed EXPLAIN statements for some complex SELECT queries could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3682)\n\nA flaw in the way MySQL processed certain alternating READ requests provided by HANDLER statements could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3681)\n\nA flaw in the way MySQL processed CREATE TEMPORARY TABLE statements that define NULL columns when using the InnoDB storage engine, could allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3680)\n\nA flaw in the way MySQL processed certain values provided to the BINLOG statement caused MySQL to read unassigned memory. A remote, authenticated attacker could possibly use this flaw to crash mysqld.\n(CVE-2010-3679)\n\nA flaw in the way MySQL processed SQL queries containing IN or CASE statements, when a NULL argument was provided as one of the arguments to the query, could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3678)\n\nA flaw in the way MySQL processed JOIN queries that attempt to retrieve data from a unique SET column could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3677)\n\nNote: CVE-2010-3840, CVE-2010-3838, CVE-2010-3837, CVE-2010-3835, CVE-2010-3833, CVE-2010-3682, CVE-2010-3681, CVE-2010-3680, CVE-2010-3678, and CVE-2010-3677 only cause a temporary denial of service, as mysqld was automatically restarted after each crash.\n\nThese updated packages upgrade MySQL to version 5.1.52. Refer to the MySQL release notes for a full list of changes :\n\nhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-52.html\n\nAll MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2011-01-19T00:00:00", "type": "nessus", "title": "RHEL 6 : mysql (RHSA-2011:0164)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:mysql", "p-cpe:/a:redhat:enterprise_linux:mysql-bench", "p-cpe:/a:redhat:enterprise_linux:mysql-debuginfo", "p-cpe:/a:redhat:enterprise_linux:mysql-devel", "p-cpe:/a:redhat:enterprise_linux:mysql-embedded", "p-cpe:/a:redhat:enterprise_linux:mysql-embedded-devel", "p-cpe:/a:redhat:enterprise_linux:mysql-libs", "p-cpe:/a:redhat:enterprise_linux:mysql-server", "p-cpe:/a:redhat:enterprise_linux:mysql-test", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:6.0"], "id": "REDHAT-RHSA-2011-0164.NASL", "href": "https://www.tenable.com/plugins/nessus/51571", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2011:0164. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51571);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_bugtraq_id(42596, 42598, 42599, 42625, 42633, 42638, 42646, 43676);\n script_xref(name:\"RHSA\", value:\"2011:0164\");\n\n script_name(english:\"RHEL 6 : mysql (RHSA-2011:0164)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated mysql packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nThe MySQL PolyFromWKB() function did not sanity check Well-Known\nBinary (WKB) data, which could allow a remote, authenticated attacker\nto crash mysqld. (CVE-2010-3840)\n\nA flaw in the way MySQL processed certain JOIN queries could allow a\nremote, authenticated attacker to cause excessive CPU use (up to\n100%), if a stored procedure contained JOIN queries, and that\nprocedure was executed twice in sequence. (CVE-2010-3839)\n\nA flaw in the way MySQL processed queries that provide a mixture of\nnumeric and longblob data types to the LEAST or GREATEST function,\ncould allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3838)\n\nA flaw in the way MySQL processed PREPARE statements containing both\nGROUP_CONCAT and the WITH ROLLUP modifier could allow a remote,\nauthenticated attacker to crash mysqld. (CVE-2010-3837)\n\nMySQL did not properly pre-evaluate LIKE arguments in view prepare\nmode, possibly allowing a remote, authenticated attacker to crash\nmysqld. (CVE-2010-3836)\n\nA flaw in the way MySQL processed statements that assign a value to a\nuser-defined variable and that also contain a logical value evaluation\ncould allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3835)\n\nA flaw in the way MySQL evaluated the arguments of extreme-value\nfunctions, such as LEAST and GREATEST, could allow a remote,\nauthenticated attacker to crash mysqld. (CVE-2010-3833)\n\nA flaw in the way MySQL handled LOAD DATA INFILE requests allowed\nMySQL to send OK packets even when there were errors. (CVE-2010-3683)\n\nA flaw in the way MySQL processed EXPLAIN statements for some complex\nSELECT queries could allow a remote, authenticated attacker to crash\nmysqld. (CVE-2010-3682)\n\nA flaw in the way MySQL processed certain alternating READ requests\nprovided by HANDLER statements could allow a remote, authenticated\nattacker to crash mysqld. (CVE-2010-3681)\n\nA flaw in the way MySQL processed CREATE TEMPORARY TABLE statements\nthat define NULL columns when using the InnoDB storage engine, could\nallow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3680)\n\nA flaw in the way MySQL processed certain values provided to the\nBINLOG statement caused MySQL to read unassigned memory. A remote,\nauthenticated attacker could possibly use this flaw to crash mysqld.\n(CVE-2010-3679)\n\nA flaw in the way MySQL processed SQL queries containing IN or CASE\nstatements, when a NULL argument was provided as one of the arguments\nto the query, could allow a remote, authenticated attacker to crash\nmysqld. (CVE-2010-3678)\n\nA flaw in the way MySQL processed JOIN queries that attempt to\nretrieve data from a unique SET column could allow a remote,\nauthenticated attacker to crash mysqld. (CVE-2010-3677)\n\nNote: CVE-2010-3840, CVE-2010-3838, CVE-2010-3837, CVE-2010-3835,\nCVE-2010-3833, CVE-2010-3682, CVE-2010-3681, CVE-2010-3680,\nCVE-2010-3678, and CVE-2010-3677 only cause a temporary denial of\nservice, as mysqld was automatically restarted after each crash.\n\nThese updated packages upgrade MySQL to version 5.1.52. Refer to the\nMySQL release notes for a full list of changes :\n\nhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-52.html\n\nAll MySQL users should upgrade to these updated packages, which\ncorrect these issues. After installing this update, the MySQL server\ndaemon (mysqld) will be restarted automatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3678\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3679\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3680\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3681\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3682\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3683\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3836\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3837\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3840\"\n );\n # http://dev.mysql.com/doc/refman/5.1/en/news-5-1-52.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://dev.mysql.com/doc/refman/5.1/en/news-5-1-52.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2011:0164\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-embedded-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/19\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2011:0164\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"mysql-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"mysql-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"mysql-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"mysql-bench-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"mysql-bench-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"mysql-bench-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"mysql-debuginfo-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"mysql-devel-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"mysql-embedded-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"mysql-embedded-devel-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"mysql-libs-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"mysql-server-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"mysql-server-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"mysql-server-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"mysql-test-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"mysql-test-5.1.52-1.el6_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"mysql-test-5.1.52-1.el6_0.1\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-debuginfo / mysql-devel / etc\");\n }\n}\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T12:54:15", "description": "From Red Hat Security Advisory 2011:0164 :\n\nUpdated mysql packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nThe MySQL PolyFromWKB() function did not sanity check Well-Known Binary (WKB) data, which could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3840)\n\nA flaw in the way MySQL processed certain JOIN queries could allow a remote, authenticated attacker to cause excessive CPU use (up to 100%), if a stored procedure contained JOIN queries, and that procedure was executed twice in sequence. (CVE-2010-3839)\n\nA flaw in the way MySQL processed queries that provide a mixture of numeric and longblob data types to the LEAST or GREATEST function, could allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3838)\n\nA flaw in the way MySQL processed PREPARE statements containing both GROUP_CONCAT and the WITH ROLLUP modifier could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3837)\n\nMySQL did not properly pre-evaluate LIKE arguments in view prepare mode, possibly allowing a remote, authenticated attacker to crash mysqld. (CVE-2010-3836)\n\nA flaw in the way MySQL processed statements that assign a value to a user-defined variable and that also contain a logical value evaluation could allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3835)\n\nA flaw in the way MySQL evaluated the arguments of extreme-value functions, such as LEAST and GREATEST, could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3833)\n\nA flaw in the way MySQL handled LOAD DATA INFILE requests allowed MySQL to send OK packets even when there were errors. (CVE-2010-3683)\n\nA flaw in the way MySQL processed EXPLAIN statements for some complex SELECT queries could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3682)\n\nA flaw in the way MySQL processed certain alternating READ requests provided by HANDLER statements could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3681)\n\nA flaw in the way MySQL processed CREATE TEMPORARY TABLE statements that define NULL columns when using the InnoDB storage engine, could allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3680)\n\nA flaw in the way MySQL processed certain values provided to the BINLOG statement caused MySQL to read unassigned memory. A remote, authenticated attacker could possibly use this flaw to crash mysqld.\n(CVE-2010-3679)\n\nA flaw in the way MySQL processed SQL queries containing IN or CASE statements, when a NULL argument was provided as one of the arguments to the query, could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3678)\n\nA flaw in the way MySQL processed JOIN queries that attempt to retrieve data from a unique SET column could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3677)\n\nNote: CVE-2010-3840, CVE-2010-3838, CVE-2010-3837, CVE-2010-3835, CVE-2010-3833, CVE-2010-3682, CVE-2010-3681, CVE-2010-3680, CVE-2010-3678, and CVE-2010-3677 only cause a temporary denial of service, as mysqld was automatically restarted after each crash.\n\nThese updated packages upgrade MySQL to version 5.1.52. Refer to the MySQL release notes for a full list of changes :\n\nhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-52.html\n\nAll MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2013-07-12T00:00:00", "type": "nessus", "title": "Oracle Linux 6 : mysql (ELSA-2011-0164)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:mysql", "p-cpe:/a:oracle:linux:mysql-bench", "p-cpe:/a:oracle:linux:mysql-devel", "p-cpe:/a:oracle:linux:mysql-embedded", "p-cpe:/a:oracle:linux:mysql-embedded-devel", "p-cpe:/a:oracle:linux:mysql-libs", "p-cpe:/a:oracle:linux:mysql-server", "p-cpe:/a:oracle:linux:mysql-test", "cpe:/o:oracle:linux:6"], "id": "ORACLELINUX_ELSA-2011-0164.NASL", "href": "https://www.tenable.com/plugins/nessus/68184", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2011:0164 and \n# Oracle Linux Security Advisory ELSA-2011-0164 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68184);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_bugtraq_id(42596, 42598, 42599, 42625, 42633, 42638, 42646, 43676);\n script_xref(name:\"RHSA\", value:\"2011:0164\");\n\n script_name(english:\"Oracle Linux 6 : mysql (ELSA-2011-0164)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2011:0164 :\n\nUpdated mysql packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nThe MySQL PolyFromWKB() function did not sanity check Well-Known\nBinary (WKB) data, which could allow a remote, authenticated attacker\nto crash mysqld. (CVE-2010-3840)\n\nA flaw in the way MySQL processed certain JOIN queries could allow a\nremote, authenticated attacker to cause excessive CPU use (up to\n100%), if a stored procedure contained JOIN queries, and that\nprocedure was executed twice in sequence. (CVE-2010-3839)\n\nA flaw in the way MySQL processed queries that provide a mixture of\nnumeric and longblob data types to the LEAST or GREATEST function,\ncould allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3838)\n\nA flaw in the way MySQL processed PREPARE statements containing both\nGROUP_CONCAT and the WITH ROLLUP modifier could allow a remote,\nauthenticated attacker to crash mysqld. (CVE-2010-3837)\n\nMySQL did not properly pre-evaluate LIKE arguments in view prepare\nmode, possibly allowing a remote, authenticated attacker to crash\nmysqld. (CVE-2010-3836)\n\nA flaw in the way MySQL processed statements that assign a value to a\nuser-defined variable and that also contain a logical value evaluation\ncould allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3835)\n\nA flaw in the way MySQL evaluated the arguments of extreme-value\nfunctions, such as LEAST and GREATEST, could allow a remote,\nauthenticated attacker to crash mysqld. (CVE-2010-3833)\n\nA flaw in the way MySQL handled LOAD DATA INFILE requests allowed\nMySQL to send OK packets even when there were errors. (CVE-2010-3683)\n\nA flaw in the way MySQL processed EXPLAIN statements for some complex\nSELECT queries could allow a remote, authenticated attacker to crash\nmysqld. (CVE-2010-3682)\n\nA flaw in the way MySQL processed certain alternating READ requests\nprovided by HANDLER statements could allow a remote, authenticated\nattacker to crash mysqld. (CVE-2010-3681)\n\nA flaw in the way MySQL processed CREATE TEMPORARY TABLE statements\nthat define NULL columns when using the InnoDB storage engine, could\nallow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3680)\n\nA flaw in the way MySQL processed certain values provided to the\nBINLOG statement caused MySQL to read unassigned memory. A remote,\nauthenticated attacker could possibly use this flaw to crash mysqld.\n(CVE-2010-3679)\n\nA flaw in the way MySQL processed SQL queries containing IN or CASE\nstatements, when a NULL argument was provided as one of the arguments\nto the query, could allow a remote, authenticated attacker to crash\nmysqld. (CVE-2010-3678)\n\nA flaw in the way MySQL processed JOIN queries that attempt to\nretrieve data from a unique SET column could allow a remote,\nauthenticated attacker to crash mysqld. (CVE-2010-3677)\n\nNote: CVE-2010-3840, CVE-2010-3838, CVE-2010-3837, CVE-2010-3835,\nCVE-2010-3833, CVE-2010-3682, CVE-2010-3681, CVE-2010-3680,\nCVE-2010-3678, and CVE-2010-3677 only cause a temporary denial of\nservice, as mysqld was automatically restarted after each crash.\n\nThese updated packages upgrade MySQL to version 5.1.52. Refer to the\nMySQL release notes for a full list of changes :\n\nhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-52.html\n\nAll MySQL users should upgrade to these updated packages, which\ncorrect these issues. After installing this update, the MySQL server\ndaemon (mysqld) will be restarted automatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2011-February/001871.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mysql packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-embedded-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL6\", reference:\"mysql-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-bench-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-devel-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-embedded-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-embedded-devel-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-libs-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-server-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mysql-test-5.1.52-1.el6_0.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-devel / mysql-embedded / etc\");\n}\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T12:57:32", "description": "The MySQL PolyFromWKB() function did not sanity check Well-Known Binary (WKB) data, which could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3840)\n\nA flaw in the way MySQL processed certain JOIN queries could allow a remote, authenticated attacker to cause excessive CPU use (up to 100%), if a stored procedure contained JOIN queries, and that procedure was executed twice in sequence. (CVE-2010-3839)\n\nA flaw in the way MySQL processed queries that provide a mixture of numeric and longblob data types to the LEAST or GREATEST function, could allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3838)\n\nA flaw in the way MySQL processed PREPARE statements containing both GROUP_CONCAT and the WITH ROLLUP modifier could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3837)\n\nMySQL did not properly pre-evaluate LIKE arguments in view prepare mode, possibly allowing a remote, authenticated attacker to crash mysqld. (CVE-2010-3836)\n\nA flaw in the way MySQL processed statements that assign a value to a user-defined variable and that also contain a logical value evaluation could allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3835)\n\nA flaw in the way MySQL evaluated the arguments of extreme-value functions, such as LEAST and GREATEST, could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3833)\n\nA flaw in the way MySQL handled LOAD DATA INFILE requests allowed MySQL to send OK packets even when there were errors. (CVE-2010-3683)\n\nA flaw in the way MySQL processed EXPLAIN statements for some complex SELECT queries could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3682)\n\nA flaw in the way MySQL processed certain alternating READ requests provided by HANDLER statements could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3681)\n\nA flaw in the way MySQL processed CREATE TEMPORARY TABLE statements that define NULL columns when using the InnoDB storage engine, could allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3680)\n\nA flaw in the way MySQL processed certain values provided to the BINLOG statement caused MySQL to read unassigned memory. A remote, authenticated attacker could possibly use this flaw to crash mysqld.\n(CVE-2010-3679)\n\nA flaw in the way MySQL processed SQL queries containing IN or CASE statements, when a NULL argument was provided as one of the arguments to the query, could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3678)\n\nA flaw in the way MySQL processed JOIN queries that attempt to retrieve data from a unique SET column could allow a remote, authenticated attacker to crash mysqld. (CVE-2010-3677)\n\nNote: CVE-2010-3840, CVE-2010-3838, CVE-2010-3837, CVE-2010-3835, CVE-2010-3833, CVE-2010-3682, CVE-2010-3681, CVE-2010-3680, CVE-2010-3678, and CVE-2010-3677 only cause a temporary denial of service, as mysqld was automatically restarted after each crash.\n\nThese updated packages upgrade MySQL to version 5.1.52. Refer to the MySQL release notes for a full list of changes :\n\nhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-52.html\n\nAfter installing this update, the MySQL server daemon (mysqld) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2012-08-01T00:00:00", "type": "nessus", "title": "Scientific Linux Security Update : mysql on SL6.x i386/x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2021-01-14T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20110118_MYSQL_ON_SL6_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60940", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60940);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n\n script_name(english:\"Scientific Linux Security Update : mysql on SL6.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The MySQL PolyFromWKB() function did not sanity check Well-Known\nBinary (WKB) data, which could allow a remote, authenticated attacker\nto crash mysqld. (CVE-2010-3840)\n\nA flaw in the way MySQL processed certain JOIN queries could allow a\nremote, authenticated attacker to cause excessive CPU use (up to\n100%), if a stored procedure contained JOIN queries, and that\nprocedure was executed twice in sequence. (CVE-2010-3839)\n\nA flaw in the way MySQL processed queries that provide a mixture of\nnumeric and longblob data types to the LEAST or GREATEST function,\ncould allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3838)\n\nA flaw in the way MySQL processed PREPARE statements containing both\nGROUP_CONCAT and the WITH ROLLUP modifier could allow a remote,\nauthenticated attacker to crash mysqld. (CVE-2010-3837)\n\nMySQL did not properly pre-evaluate LIKE arguments in view prepare\nmode, possibly allowing a remote, authenticated attacker to crash\nmysqld. (CVE-2010-3836)\n\nA flaw in the way MySQL processed statements that assign a value to a\nuser-defined variable and that also contain a logical value evaluation\ncould allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3835)\n\nA flaw in the way MySQL evaluated the arguments of extreme-value\nfunctions, such as LEAST and GREATEST, could allow a remote,\nauthenticated attacker to crash mysqld. (CVE-2010-3833)\n\nA flaw in the way MySQL handled LOAD DATA INFILE requests allowed\nMySQL to send OK packets even when there were errors. (CVE-2010-3683)\n\nA flaw in the way MySQL processed EXPLAIN statements for some complex\nSELECT queries could allow a remote, authenticated attacker to crash\nmysqld. (CVE-2010-3682)\n\nA flaw in the way MySQL processed certain alternating READ requests\nprovided by HANDLER statements could allow a remote, authenticated\nattacker to crash mysqld. (CVE-2010-3681)\n\nA flaw in the way MySQL processed CREATE TEMPORARY TABLE statements\nthat define NULL columns when using the InnoDB storage engine, could\nallow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3680)\n\nA flaw in the way MySQL processed certain values provided to the\nBINLOG statement caused MySQL to read unassigned memory. A remote,\nauthenticated attacker could possibly use this flaw to crash mysqld.\n(CVE-2010-3679)\n\nA flaw in the way MySQL processed SQL queries containing IN or CASE\nstatements, when a NULL argument was provided as one of the arguments\nto the query, could allow a remote, authenticated attacker to crash\nmysqld. (CVE-2010-3678)\n\nA flaw in the way MySQL processed JOIN queries that attempt to\nretrieve data from a unique SET column could allow a remote,\nauthenticated attacker to crash mysqld. (CVE-2010-3677)\n\nNote: CVE-2010-3840, CVE-2010-3838, CVE-2010-3837, CVE-2010-3835,\nCVE-2010-3833, CVE-2010-3682, CVE-2010-3681, CVE-2010-3680,\nCVE-2010-3678, and CVE-2010-3677 only cause a temporary denial of\nservice, as mysqld was automatically restarted after each crash.\n\nThese updated packages upgrade MySQL to version 5.1.52. Refer to the\nMySQL release notes for a full list of changes :\n\nhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-52.html\n\nAfter installing this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n # http://dev.mysql.com/doc/refman/5.1/en/news-5-1-52.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://dev.mysql.com/doc/refman/5.1/en/news-5-1-52.html\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1103&L=scientific-linux-errata&T=0&P=4794\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b8d8afaf\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL6\", reference:\"mysql-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-bench-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-devel-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-embedded-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-embedded-devel-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-libs-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-server-5.1.52-1.el6_0.1\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"mysql-test-5.1.52-1.el6_0.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:02:21", "description": "It was discovered that MySQL incorrectly handled certain requests with the UPGRADE DATA DIRECTORY NAME command. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-2008)\n\nIt was discovered that MySQL incorrectly handled joins involving a table with a unique SET column. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS.\n(CVE-2010-3677)\n\nIt was discovered that MySQL incorrectly handled NULL arguments to IN() or CASE operations. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-3678)\n\nIt was discovered that MySQL incorrectly handled malformed arguments to the BINLOG statement. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-3679)\n\nIt was discovered that MySQL incorrectly handled the use of TEMPORARY InnoDB tables with nullable columns. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS.\n(CVE-2010-3680)\n\nIt was discovered that MySQL incorrectly handled alternate reads from two indexes on a table using the HANDLER interface. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3681)\n\nIt was discovered that MySQL incorrectly handled use of EXPLAIN with certain queries. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3682)\n\nIt was discovered that MySQL incorrectly handled error reporting when using LOAD DATA INFILE and would incorrectly raise an assert in certain circumstances. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-3683)\n\nIt was discovered that MySQL incorrectly handled propagation during evaluation of arguments to extreme-value functions. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10. (CVE-2010-3833)\n\nIt was discovered that MySQL incorrectly handled materializing a derived table that required a temporary table for grouping. An authenticated user could exploit this to make MySQL crash, causing a denial of service. (CVE-2010-3834)\n\nIt was discovered that MySQL incorrectly handled certain user-variable assignment expressions that are evaluated in a logical expression context. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10. (CVE-2010-3835)\n\nIt was discovered that MySQL incorrectly handled pre-evaluation of LIKE predicates during view preparation. An authenticated user could exploit this to make MySQL crash, causing a denial of service.\n(CVE-2010-3836)\n\nIt was discovered that MySQL incorrectly handled using GROUP_CONCAT() and WITH ROLLUP together. An authenticated user could exploit this to make MySQL crash, causing a denial of service. (CVE-2010-3837)\n\nIt was discovered that MySQL incorrectly handled certain queries using a mixed list of numeric and LONGBLOB arguments to the GREATEST() or LEAST() functions. An authenticated user could exploit this to make MySQL crash, causing a denial of service. (CVE-2010-3838)\n\nIt was discovered that MySQL incorrectly handled queries with nested joins when used from stored procedures and prepared statements. An authenticated user could exploit this to make MySQL hang, causing a denial of service. This issue only affected Ubuntu 9.10, 10.04 LTS and 10.10. (CVE-2010-3839)\n\nIt was discovered that MySQL incorrectly handled improper WKB data passed to the PolyFromWKB() function. An authenticated user could exploit this to make MySQL crash, causing a denial of service.\n(CVE-2010-3840).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2010-11-12T00:00:00", "type": "nessus", "title": "Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities (USN-1017-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683", "CVE-2010-3833", "CVE-2010-3834", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2019-09-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libmysqlclient-dev", "p-cpe:/a:canonical:ubuntu_linux:libmysqlclient15-dev", "p-cpe:/a:canonical:ubuntu_linux:libmysqlclient15off", "p-cpe:/a:canonical:ubuntu_linux:libmysqlclient16", "p-cpe:/a:canonical:ubuntu_linux:libmysqlclient16-dev", "p-cpe:/a:canonical:ubuntu_linux:libmysqld-dev", "p-cpe:/a:canonical:ubuntu_linux:libmysqld-pic", "p-cpe:/a:canonical:ubuntu_linux:mysql-client", "p-cpe:/a:canonical:ubuntu_linux:mysql-client-5.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-client-5.1", "p-cpe:/a:canonical:ubuntu_linux:mysql-client-core-5.1", "p-cpe:/a:canonical:ubuntu_linux:mysql-common", "p-cpe:/a:canonical:ubuntu_linux:mysql-server", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.1", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-core-5.1", "p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:10.10", "cpe:/o:canonical:ubuntu_linux:6.06:-:lts", "cpe:/o:canonical:ubuntu_linux:8.04:-:lts", "cpe:/o:canonical:ubuntu_linux:9.10"], "id": "UBUNTU_USN-1017-1.NASL", "href": "https://www.tenable.com/plugins/nessus/50573", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1017-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(50573);\n script_version(\"1.12\");\n script_cvs_date(\"Date: 2019/09/19 12:54:26\");\n\n script_cve_id(\"CVE-2010-2008\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_bugtraq_id(41198, 42596, 42598, 42599, 42625, 42633, 42638, 42646, 43676);\n script_xref(name:\"USN\", value:\"1017-1\");\n\n script_name(english:\"Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities (USN-1017-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that MySQL incorrectly handled certain requests with\nthe UPGRADE DATA DIRECTORY NAME command. An authenticated user could\nexploit this to make MySQL crash, causing a denial of service. This\nissue only affected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-2008)\n\nIt was discovered that MySQL incorrectly handled joins involving a\ntable with a unique SET column. An authenticated user could exploit\nthis to make MySQL crash, causing a denial of service. This issue only\naffected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS.\n(CVE-2010-3677)\n\nIt was discovered that MySQL incorrectly handled NULL arguments to\nIN() or CASE operations. An authenticated user could exploit this to\nmake MySQL crash, causing a denial of service. This issue only\naffected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-3678)\n\nIt was discovered that MySQL incorrectly handled malformed arguments\nto the BINLOG statement. An authenticated user could exploit this to\nmake MySQL crash, causing a denial of service. This issue only\naffected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-3679)\n\nIt was discovered that MySQL incorrectly handled the use of TEMPORARY\nInnoDB tables with nullable columns. An authenticated user could\nexploit this to make MySQL crash, causing a denial of service. This\nissue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS.\n(CVE-2010-3680)\n\nIt was discovered that MySQL incorrectly handled alternate reads from\ntwo indexes on a table using the HANDLER interface. An authenticated\nuser could exploit this to make MySQL crash, causing a denial of\nservice. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and\n10.04 LTS. (CVE-2010-3681)\n\nIt was discovered that MySQL incorrectly handled use of EXPLAIN with\ncertain queries. An authenticated user could exploit this to make\nMySQL crash, causing a denial of service. This issue only affected\nUbuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3682)\n\nIt was discovered that MySQL incorrectly handled error reporting when\nusing LOAD DATA INFILE and would incorrectly raise an assert in\ncertain circumstances. An authenticated user could exploit this to\nmake MySQL crash, causing a denial of service. This issue only\naffected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-3683)\n\nIt was discovered that MySQL incorrectly handled propagation during\nevaluation of arguments to extreme-value functions. An authenticated\nuser could exploit this to make MySQL crash, causing a denial of\nservice. This issue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and\n10.10. (CVE-2010-3833)\n\nIt was discovered that MySQL incorrectly handled materializing a\nderived table that required a temporary table for grouping. An\nauthenticated user could exploit this to make MySQL crash, causing a\ndenial of service. (CVE-2010-3834)\n\nIt was discovered that MySQL incorrectly handled certain user-variable\nassignment expressions that are evaluated in a logical expression\ncontext. An authenticated user could exploit this to make MySQL crash,\ncausing a denial of service. This issue only affected Ubuntu 8.04 LTS,\n9.10, 10.04 LTS and 10.10. (CVE-2010-3835)\n\nIt was discovered that MySQL incorrectly handled pre-evaluation of\nLIKE predicates during view preparation. An authenticated user could\nexploit this to make MySQL crash, causing a denial of service.\n(CVE-2010-3836)\n\nIt was discovered that MySQL incorrectly handled using GROUP_CONCAT()\nand WITH ROLLUP together. An authenticated user could exploit this to\nmake MySQL crash, causing a denial of service. (CVE-2010-3837)\n\nIt was discovered that MySQL incorrectly handled certain queries using\na mixed list of numeric and LONGBLOB arguments to the GREATEST() or\nLEAST() functions. An authenticated user could exploit this to make\nMySQL crash, causing a denial of service. (CVE-2010-3838)\n\nIt was discovered that MySQL incorrectly handled queries with nested\njoins when used from stored procedures and prepared statements. An\nauthenticated user could exploit this to make MySQL hang, causing a\ndenial of service. This issue only affected Ubuntu 9.10, 10.04 LTS and\n10.10. (CVE-2010-3839)\n\nIt was discovered that MySQL incorrectly handled improper WKB data\npassed to the PolyFromWKB() function. An authenticated user could\nexploit this to make MySQL crash, causing a denial of service.\n(CVE-2010-3840).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1017-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient15-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient15off\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient16\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqld-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqld-pic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client-5.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client-core-5.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-core-5.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:9.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/07/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/11/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(6\\.06|8\\.04|9\\.10|10\\.04|10\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.06 / 8.04 / 9.10 / 10.04 / 10.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libmysqlclient15-dev\", pkgver:\"5.0.22-0ubuntu6.06.15\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libmysqlclient15off\", pkgver:\"5.0.22-0ubuntu6.06.15\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mysql-client\", pkgver:\"5.0.22-0ubuntu6.06.15\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mysql-client-5.0\", pkgver:\"5.0.22-0ubuntu6.06.15\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mysql-common\", pkgver:\"5.0.22-0ubuntu6.06.15\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mysql-server\", pkgver:\"5.0.22-0ubuntu6.06.15\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mysql-server-5.0\", pkgver:\"5.0.22-0ubuntu6.06.15\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libmysqlclient15-dev\", pkgver:\"5.0.51a-3ubuntu5.8\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libmysqlclient15off\", pkgver:\"5.0.51a-3ubuntu5.8\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"mysql-client\", pkgver:\"5.0.51a-3ubuntu5.8\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"mysql-client-5.0\", pkgver:\"5.0.51a-3ubuntu5.8\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"mysql-common\", pkgver:\"5.0.51a-3ubuntu5.8\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"mysql-server\", pkgver:\"5.0.51a-3ubuntu5.8\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"mysql-server-5.0\", pkgver:\"5.0.51a-3ubuntu5.8\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libmysqlclient-dev\", pkgver:\"5.1.37-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libmysqlclient16\", pkgver:\"5.1.37-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libmysqlclient16-dev\", pkgver:\"5.1.37-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libmysqld-dev\", pkgver:\"5.1.37-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libmysqld-pic\", pkgver:\"5.1.37-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"mysql-client\", pkgver:\"5.1.37-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"mysql-client-5.1\", pkgver:\"5.1.37-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"mysql-common\", pkgver:\"5.1.37-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"mysql-server\", pkgver:\"5.1.37-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"mysql-server-5.1\", pkgver:\"5.1.37-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"mysql-server-core-5.1\", pkgver:\"5.1.37-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libmysqlclient-dev\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libmysqlclient16\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libmysqlclient16-dev\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libmysqld-dev\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libmysqld-pic\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"mysql-client\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"mysql-client-5.1\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"mysql-client-core-5.1\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"mysql-common\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"mysql-server\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"mysql-server-5.1\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"mysql-server-core-5.1\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"mysql-testsuite\", pkgver:\"5.1.41-3ubuntu12.7\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libmysqlclient-dev\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libmysqlclient16\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libmysqlclient16-dev\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libmysqld-dev\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libmysqld-pic\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"mysql-client\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"mysql-client-5.1\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"mysql-client-core-5.1\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"mysql-common\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"mysql-server\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"mysql-server-5.1\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"mysql-server-core-5.1\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"mysql-testsuite\", pkgver:\"5.1.49-1ubuntu8.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libmysqlclient-dev / libmysqlclient15-dev / libmysqlclient15off / etc\");\n}\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T12:53:31", "description": "From Red Hat Security Advisory 2010:0825 :\n\nUpdated mysql packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity check Well-Known Binary (WKB) data. A remote, authenticated attacker could use specially crafted WKB data to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain JOIN queries. If a stored procedure contained JOIN queries, and that procedure was executed twice in sequence, it could cause an infinite loop, leading to excessive CPU use (up to 100%). A remote, authenticated attacker could use this flaw to cause a denial of service. (CVE-2010-3839)\n\nA flaw was found in the way MySQL processed queries that provide a mixture of numeric and longblob data types to the LEAST or GREATEST function. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3838)\n\nA flaw was found in the way MySQL processed PREPARE statements containing both GROUP_CONCAT and the WITH ROLLUP modifier. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3837)\n\nIt was found that MySQL did not properly pre-evaluate LIKE arguments in view prepare mode. A remote, authenticated attacker could possibly use this flaw to crash mysqld. (CVE-2010-3836)\n\nA flaw was found in the way MySQL processed statements that assign a value to a user-defined variable and that also contain a logical value evaluation. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3835)\n\nA flaw was found in the way MySQL evaluated the arguments of extreme-value functions, such as LEAST and GREATEST. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3833)\n\nA flaw was found in the way MySQL processed EXPLAIN statements for some complex SELECT queries. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3682)\n\nA flaw was found in the way MySQL processed certain alternating READ requests provided by HANDLER statements. A remote, authenticated attacker could use this flaw to provide such requests, causing mysqld to crash. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA flaw was found in the way MySQL processed CREATE TEMPORARY TABLE statements that define NULL columns when using the InnoDB storage engine. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3680)\n\nA flaw was found in the way MySQL processed JOIN queries that attempt to retrieve data from a unique SET column. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3677)\n\nAll MySQL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2013-07-12T00:00:00", "type": "nessus", "title": "Oracle Linux 5 : mysql (ELSA-2010-0825)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:mysql", "p-cpe:/a:oracle:linux:mysql-bench", "p-cpe:/a:oracle:linux:mysql-devel", "p-cpe:/a:oracle:linux:mysql-server", "p-cpe:/a:oracle:linux:mysql-test", "cpe:/o:oracle:linux:5"], "id": "ORACLELINUX_ELSA-2010-0825.NASL", "href": "https://www.tenable.com/plugins/nessus/68134", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2010:0825 and \n# Oracle Linux Security Advisory ELSA-2010-0825 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68134);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_bugtraq_id(42598, 42599, 42633, 42646, 43676);\n script_xref(name:\"RHSA\", value:\"2010:0825\");\n\n script_name(english:\"Oracle Linux 5 : mysql (ELSA-2010-0825)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2010:0825 :\n\nUpdated mysql packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity\ncheck Well-Known Binary (WKB) data. A remote, authenticated attacker\ncould use specially crafted WKB data to crash mysqld. This issue only\ncaused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain JOIN queries. If a\nstored procedure contained JOIN queries, and that procedure was\nexecuted twice in sequence, it could cause an infinite loop, leading\nto excessive CPU use (up to 100%). A remote, authenticated attacker\ncould use this flaw to cause a denial of service. (CVE-2010-3839)\n\nA flaw was found in the way MySQL processed queries that provide a\nmixture of numeric and longblob data types to the LEAST or GREATEST\nfunction. A remote, authenticated attacker could use this flaw to\ncrash mysqld. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3838)\n\nA flaw was found in the way MySQL processed PREPARE statements\ncontaining both GROUP_CONCAT and the WITH ROLLUP modifier. A remote,\nauthenticated attacker could use this flaw to crash mysqld. This issue\nonly caused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3837)\n\nIt was found that MySQL did not properly pre-evaluate LIKE arguments\nin view prepare mode. A remote, authenticated attacker could possibly\nuse this flaw to crash mysqld. (CVE-2010-3836)\n\nA flaw was found in the way MySQL processed statements that assign a\nvalue to a user-defined variable and that also contain a logical value\nevaluation. A remote, authenticated attacker could use this flaw to\ncrash mysqld. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3835)\n\nA flaw was found in the way MySQL evaluated the arguments of\nextreme-value functions, such as LEAST and GREATEST. A remote,\nauthenticated attacker could use this flaw to crash mysqld. This issue\nonly caused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3833)\n\nA flaw was found in the way MySQL processed EXPLAIN statements for\nsome complex SELECT queries. A remote, authenticated attacker could\nuse this flaw to crash mysqld. This issue only caused a temporary\ndenial of service, as mysqld was automatically restarted after the\ncrash. (CVE-2010-3682)\n\nA flaw was found in the way MySQL processed certain alternating READ\nrequests provided by HANDLER statements. A remote, authenticated\nattacker could use this flaw to provide such requests, causing mysqld\nto crash. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA flaw was found in the way MySQL processed CREATE TEMPORARY TABLE\nstatements that define NULL columns when using the InnoDB storage\nengine. A remote, authenticated attacker could use this flaw to crash\nmysqld. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3680)\n\nA flaw was found in the way MySQL processed JOIN queries that attempt\nto retrieve data from a unique SET column. A remote, authenticated\nattacker could use this flaw to crash mysqld. This issue only caused a\ntemporary denial of service, as mysqld was automatically restarted\nafter the crash. (CVE-2010-3677)\n\nAll MySQL users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After\ninstalling this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2010-November/001724.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mysql packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"mysql-5.0.77-4.el5_5.4\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"mysql-bench-5.0.77-4.el5_5.4\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"mysql-devel-5.0.77-4.el5_5.4\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"mysql-server-5.0.77-4.el5_5.4\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"mysql-test-5.0.77-4.el5_5.4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-devel / mysql-server / mysql-test\");\n}\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:02:43", "description": "Updated mysql packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity check Well-Known Binary (WKB) data. A remote, authenticated attacker could use specially crafted WKB data to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain JOIN queries. If a stored procedure contained JOIN queries, and that procedure was executed twice in sequence, it could cause an infinite loop, leading to excessive CPU use (up to 100%). A remote, authenticated attacker could use this flaw to cause a denial of service. (CVE-2010-3839)\n\nA flaw was found in the way MySQL processed queries that provide a mixture of numeric and longblob data types to the LEAST or GREATEST function. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3838)\n\nA flaw was found in the way MySQL processed PREPARE statements containing both GROUP_CONCAT and the WITH ROLLUP modifier. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3837)\n\nIt was found that MySQL did not properly pre-evaluate LIKE arguments in view prepare mode. A remote, authenticated attacker could possibly use this flaw to crash mysqld. (CVE-2010-3836)\n\nA flaw was found in the way MySQL processed statements that assign a value to a user-defined variable and that also contain a logical value evaluation. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3835)\n\nA flaw was found in the way MySQL evaluated the arguments of extreme-value functions, such as LEAST and GREATEST. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3833)\n\nA flaw was found in the way MySQL processed EXPLAIN statements for some complex SELECT queries. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3682)\n\nA flaw was found in the way MySQL processed certain alternating READ requests provided by HANDLER statements. A remote, authenticated attacker could use this flaw to provide such requests, causing mysqld to crash. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA flaw was found in the way MySQL processed CREATE TEMPORARY TABLE statements that define NULL columns when using the InnoDB storage engine. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3680)\n\nA flaw was found in the way MySQL processed JOIN queries that attempt to retrieve data from a unique SET column. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3677)\n\nAll MySQL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2010-11-04T00:00:00", "type": "nessus", "title": "RHEL 5 : mysql (RHSA-2010:0825)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:mysql", "p-cpe:/a:redhat:enterprise_linux:mysql-bench", "p-cpe:/a:redhat:enterprise_linux:mysql-devel", "p-cpe:/a:redhat:enterprise_linux:mysql-server", "p-cpe:/a:redhat:enterprise_linux:mysql-test", "cpe:/o:redhat:enterprise_linux:5"], "id": "REDHAT-RHSA-2010-0825.NASL", "href": "https://www.tenable.com/plugins/nessus/50474", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0825. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50474);\n script_version(\"1.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_bugtraq_id(42598, 42599, 42633, 42646, 43676);\n script_xref(name:\"RHSA\", value:\"2010:0825\");\n\n script_name(english:\"RHEL 5 : mysql (RHSA-2010:0825)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated mysql packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity\ncheck Well-Known Binary (WKB) data. A remote, authenticated attacker\ncould use specially crafted WKB data to crash mysqld. This issue only\ncaused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain JOIN queries. If a\nstored procedure contained JOIN queries, and that procedure was\nexecuted twice in sequence, it could cause an infinite loop, leading\nto excessive CPU use (up to 100%). A remote, authenticated attacker\ncould use this flaw to cause a denial of service. (CVE-2010-3839)\n\nA flaw was found in the way MySQL processed queries that provide a\nmixture of numeric and longblob data types to the LEAST or GREATEST\nfunction. A remote, authenticated attacker could use this flaw to\ncrash mysqld. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3838)\n\nA flaw was found in the way MySQL processed PREPARE statements\ncontaining both GROUP_CONCAT and the WITH ROLLUP modifier. A remote,\nauthenticated attacker could use this flaw to crash mysqld. This issue\nonly caused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3837)\n\nIt was found that MySQL did not properly pre-evaluate LIKE arguments\nin view prepare mode. A remote, authenticated attacker could possibly\nuse this flaw to crash mysqld. (CVE-2010-3836)\n\nA flaw was found in the way MySQL processed statements that assign a\nvalue to a user-defined variable and that also contain a logical value\nevaluation. A remote, authenticated attacker could use this flaw to\ncrash mysqld. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3835)\n\nA flaw was found in the way MySQL evaluated the arguments of\nextreme-value functions, such as LEAST and GREATEST. A remote,\nauthenticated attacker could use this flaw to crash mysqld. This issue\nonly caused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3833)\n\nA flaw was found in the way MySQL processed EXPLAIN statements for\nsome complex SELECT queries. A remote, authenticated attacker could\nuse this flaw to crash mysqld. This issue only caused a temporary\ndenial of service, as mysqld was automatically restarted after the\ncrash. (CVE-2010-3682)\n\nA flaw was found in the way MySQL processed certain alternating READ\nrequests provided by HANDLER statements. A remote, authenticated\nattacker could use this flaw to provide such requests, causing mysqld\nto crash. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA flaw was found in the way MySQL processed CREATE TEMPORARY TABLE\nstatements that define NULL columns when using the InnoDB storage\nengine. A remote, authenticated attacker could use this flaw to crash\nmysqld. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3680)\n\nA flaw was found in the way MySQL processed JOIN queries that attempt\nto retrieve data from a unique SET column. A remote, authenticated\nattacker could use this flaw to crash mysqld. This issue only caused a\ntemporary denial of service, as mysqld was automatically restarted\nafter the crash. (CVE-2010-3677)\n\nAll MySQL users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After\ninstalling this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3680\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3681\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3682\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3836\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3837\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2010:0825\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/11/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2010:0825\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", reference:\"mysql-5.0.77-4.el5_5.4\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"mysql-bench-5.0.77-4.el5_5.4\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"mysql-bench-5.0.77-4.el5_5.4\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"mysql-bench-5.0.77-4.el5_5.4\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"mysql-devel-5.0.77-4.el5_5.4\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"mysql-server-5.0.77-4.el5_5.4\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"mysql-server-5.0.77-4.el5_5.4\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"mysql-server-5.0.77-4.el5_5.4\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"mysql-test-5.0.77-4.el5_5.4\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"mysql-test-5.0.77-4.el5_5.4\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"mysql-test-5.0.77-4.el5_5.4\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-devel / mysql-server / mysql-test\");\n }\n}\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:02:21", "description": "Updated mysql packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity check Well-Known Binary (WKB) data. A remote, authenticated attacker could use specially crafted WKB data to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain JOIN queries. If a stored procedure contained JOIN queries, and that procedure was executed twice in sequence, it could cause an infinite loop, leading to excessive CPU use (up to 100%). A remote, authenticated attacker could use this flaw to cause a denial of service. (CVE-2010-3839)\n\nA flaw was found in the way MySQL processed queries that provide a mixture of numeric and longblob data types to the LEAST or GREATEST function. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3838)\n\nA flaw was found in the way MySQL processed PREPARE statements containing both GROUP_CONCAT and the WITH ROLLUP modifier. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3837)\n\nIt was found that MySQL did not properly pre-evaluate LIKE arguments in view prepare mode. A remote, authenticated attacker could possibly use this flaw to crash mysqld. (CVE-2010-3836)\n\nA flaw was found in the way MySQL processed statements that assign a value to a user-defined variable and that also contain a logical value evaluation. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3835)\n\nA flaw was found in the way MySQL evaluated the arguments of extreme-value functions, such as LEAST and GREATEST. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3833)\n\nA flaw was found in the way MySQL processed EXPLAIN statements for some complex SELECT queries. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3682)\n\nA flaw was found in the way MySQL processed certain alternating READ requests provided by HANDLER statements. A remote, authenticated attacker could use this flaw to provide such requests, causing mysqld to crash. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA flaw was found in the way MySQL processed CREATE TEMPORARY TABLE statements that define NULL columns when using the InnoDB storage engine. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3680)\n\nA flaw was found in the way MySQL processed JOIN queries that attempt to retrieve data from a unique SET column. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3677)\n\nAll MySQL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2010-11-24T00:00:00", "type": "nessus", "title": "CentOS 5 : mysql (CESA-2010:0825)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:mysql", "p-cpe:/a:centos:centos:mysql-bench", "p-cpe:/a:centos:centos:mysql-devel", "p-cpe:/a:centos:centos:mysql-server", "p-cpe:/a:centos:centos:mysql-test", "cpe:/o:centos:centos:5"], "id": "CENTOS_RHSA-2010-0825.NASL", "href": "https://www.tenable.com/plugins/nessus/50806", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0825 and \n# CentOS Errata and Security Advisory 2010:0825 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50806);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_bugtraq_id(42598, 42599, 42633, 42646, 43676);\n script_xref(name:\"RHSA\", value:\"2010:0825\");\n\n script_name(english:\"CentOS 5 : mysql (CESA-2010:0825)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated mysql packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity\ncheck Well-Known Binary (WKB) data. A remote, authenticated attacker\ncould use specially crafted WKB data to crash mysqld. This issue only\ncaused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain JOIN queries. If a\nstored procedure contained JOIN queries, and that procedure was\nexecuted twice in sequence, it could cause an infinite loop, leading\nto excessive CPU use (up to 100%). A remote, authenticated attacker\ncould use this flaw to cause a denial of service. (CVE-2010-3839)\n\nA flaw was found in the way MySQL processed queries that provide a\nmixture of numeric and longblob data types to the LEAST or GREATEST\nfunction. A remote, authenticated attacker could use this flaw to\ncrash mysqld. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3838)\n\nA flaw was found in the way MySQL processed PREPARE statements\ncontaining both GROUP_CONCAT and the WITH ROLLUP modifier. A remote,\nauthenticated attacker could use this flaw to crash mysqld. This issue\nonly caused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3837)\n\nIt was found that MySQL did not properly pre-evaluate LIKE arguments\nin view prepare mode. A remote, authenticated attacker could possibly\nuse this flaw to crash mysqld. (CVE-2010-3836)\n\nA flaw was found in the way MySQL processed statements that assign a\nvalue to a user-defined variable and that also contain a logical value\nevaluation. A remote, authenticated attacker could use this flaw to\ncrash mysqld. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3835)\n\nA flaw was found in the way MySQL evaluated the arguments of\nextreme-value functions, such as LEAST and GREATEST. A remote,\nauthenticated attacker could use this flaw to crash mysqld. This issue\nonly caused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3833)\n\nA flaw was found in the way MySQL processed EXPLAIN statements for\nsome complex SELECT queries. A remote, authenticated attacker could\nuse this flaw to crash mysqld. This issue only caused a temporary\ndenial of service, as mysqld was automatically restarted after the\ncrash. (CVE-2010-3682)\n\nA flaw was found in the way MySQL processed certain alternating READ\nrequests provided by HANDLER statements. A remote, authenticated\nattacker could use this flaw to provide such requests, causing mysqld\nto crash. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA flaw was found in the way MySQL processed CREATE TEMPORARY TABLE\nstatements that define NULL columns when using the InnoDB storage\nengine. A remote, authenticated attacker could use this flaw to crash\nmysqld. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3680)\n\nA flaw was found in the way MySQL processed JOIN queries that attempt\nto retrieve data from a unique SET column. A remote, authenticated\nattacker could use this flaw to crash mysqld. This issue only caused a\ntemporary denial of service, as mysqld was automatically restarted\nafter the crash. (CVE-2010-3677)\n\nAll MySQL users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After\ninstalling this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-November/017144.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?dab7c63a\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-November/017145.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?dea757df\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mysql packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/11/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"mysql-5.0.77-4.el5_5.4\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"mysql-bench-5.0.77-4.el5_5.4\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"mysql-devel-5.0.77-4.el5_5.4\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"mysql-server-5.0.77-4.el5_5.4\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"mysql-test-5.0.77-4.el5_5.4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-devel / mysql-server / mysql-test\");\n}\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T12:57:39", "description": "It was found that the MySQL PolyFromWKB() function did not sanity check Well-Known Binary (WKB) data. A remote, authenticated attacker could use specially crafted WKB data to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain JOIN queries. If a stored procedure contained JOIN queries, and that procedure was executed twice in sequence, it could cause an infinite loop, leading to excessive CPU use (up to 100%). A remote, authenticated attacker could use this flaw to cause a denial of service. (CVE-2010-3839)\n\nA flaw was found in the way MySQL processed queries that provide a mixture of numeric and longblob data types to the LEAST or GREATEST function. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3838)\n\nA flaw was found in the way MySQL processed PREPARE statements containing both GROUP_CONCAT and the WITH ROLLUP modifier. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3837)\n\nIt was found that MySQL did not properly pre-evaluate LIKE arguments in view prepare mode. A remote, authenticated attacker could possibly use this flaw to crash mysqld. (CVE-2010-3836)\n\nA flaw was found in the way MySQL processed statements that assign a value to a user-defined variable and that also contain a logical value evaluation. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3835)\n\nA flaw was found in the way MySQL evaluated the arguments of extreme-value functions, such as LEAST and GREATEST. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3833)\n\nA flaw was found in the way MySQL processed EXPLAIN statements for some complex SELECT queries. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3682)\n\nA flaw was found in the way MySQL processed certain alternating READ requests provided by HANDLER statements. A remote, authenticated attacker could use this flaw to provide such requests, causing mysqld to crash. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA flaw was found in the way MySQL processed CREATE TEMPORARY TABLE statements that define NULL columns when using the InnoDB storage engine. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3680)\n\nA flaw was found in the way MySQL processed JOIN queries that attempt to retrieve data from a unique SET column. A remote, authenticated attacker could use this flaw to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3677)\n\nAfter installing this update, the MySQL server daemon (mysqld) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2012-08-01T00:00:00", "type": "nessus", "title": "Scientific Linux Security Update : mysql on SL5.x i386/x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3677", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2021-01-14T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20101103_MYSQL_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60884", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60884);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n\n script_name(english:\"Scientific Linux Security Update : mysql on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was found that the MySQL PolyFromWKB() function did not sanity\ncheck Well-Known Binary (WKB) data. A remote, authenticated attacker\ncould use specially crafted WKB data to crash mysqld. This issue only\ncaused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain JOIN queries. If a\nstored procedure contained JOIN queries, and that procedure was\nexecuted twice in sequence, it could cause an infinite loop, leading\nto excessive CPU use (up to 100%). A remote, authenticated attacker\ncould use this flaw to cause a denial of service. (CVE-2010-3839)\n\nA flaw was found in the way MySQL processed queries that provide a\nmixture of numeric and longblob data types to the LEAST or GREATEST\nfunction. A remote, authenticated attacker could use this flaw to\ncrash mysqld. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3838)\n\nA flaw was found in the way MySQL processed PREPARE statements\ncontaining both GROUP_CONCAT and the WITH ROLLUP modifier. A remote,\nauthenticated attacker could use this flaw to crash mysqld. This issue\nonly caused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3837)\n\nIt was found that MySQL did not properly pre-evaluate LIKE arguments\nin view prepare mode. A remote, authenticated attacker could possibly\nuse this flaw to crash mysqld. (CVE-2010-3836)\n\nA flaw was found in the way MySQL processed statements that assign a\nvalue to a user-defined variable and that also contain a logical value\nevaluation. A remote, authenticated attacker could use this flaw to\ncrash mysqld. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3835)\n\nA flaw was found in the way MySQL evaluated the arguments of\nextreme-value functions, such as LEAST and GREATEST. A remote,\nauthenticated attacker could use this flaw to crash mysqld. This issue\nonly caused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3833)\n\nA flaw was found in the way MySQL processed EXPLAIN statements for\nsome complex SELECT queries. A remote, authenticated attacker could\nuse this flaw to crash mysqld. This issue only caused a temporary\ndenial of service, as mysqld was automatically restarted after the\ncrash. (CVE-2010-3682)\n\nA flaw was found in the way MySQL processed certain alternating READ\nrequests provided by HANDLER statements. A remote, authenticated\nattacker could use this flaw to provide such requests, causing mysqld\nto crash. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA flaw was found in the way MySQL processed CREATE TEMPORARY TABLE\nstatements that define NULL columns when using the InnoDB storage\nengine. A remote, authenticated attacker could use this flaw to crash\nmysqld. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3680)\n\nA flaw was found in the way MySQL processed JOIN queries that attempt\nto retrieve data from a unique SET column. A remote, authenticated\nattacker could use this flaw to crash mysqld. This issue only caused a\ntemporary denial of service, as mysqld was automatically restarted\nafter the crash. (CVE-2010-3677)\n\nAfter installing this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1011&L=scientific-linux-errata&T=0&P=194\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?208167f3\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"mysql-5.0.77-4.el5_5.4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"mysql-bench-5.0.77-4.el5_5.4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"mysql-devel-5.0.77-4.el5_5.4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"mysql-server-5.0.77-4.el5_5.4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"mysql-test-5.0.77-4.el5_5.4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:01:54", "description": "Several vulnerabilities have been discovered in the MySQL database server. The Common Vulnerabilities and Exposures project identifies the following problems :\n\n - CVE-2010-3677 It was discovered that MySQL allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.\n\n - CVE-2010-3680 It was discovered that MySQL allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables while using InnoDB, which triggers an assertion failure.\n\n - CVE-2010-3681 It was discovered that MySQL allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing 'alternate reads from two indexes on a table,' which triggers an assertion failure.\n\n - CVE-2010-3682 It was discovered that MySQL incorrectly handled use of EXPLAIN with certain queries. An authenticated user could crash the server.\n\n - CVE-2010-3833 It was discovered that MySQL incorrectly handled propagation during evaluation of arguments to extreme-value functions. An authenticated user could crash the server.\n\n - CVE-2010-3834 It was discovered that MySQL incorrectly handled materializing a derived table that required a temporary table for grouping. An authenticated user could crash the server.\n\n - CVE-2010-3835 It was discovered that MySQL incorrectly handled certain user-variable assignment expressions that are evaluated in a logical expression context. An authenticated user could crash the server.\n\n - CVE-2010-3836 It was discovered that MySQL incorrectly handled pre-evaluation of LIKE predicates during view preparation. An authenticated user could crash the server.\n\n - CVE-2010-3837 It was discovered that MySQL incorrectly handled using GROUP_CONCAT() and WITH ROLLUP together. An authenticated user could crash the server.\n\n - CVE-2010-3838 It was discovered that MySQL incorrectly handled certain queries using a mixed list of numeric and LONGBLOB arguments to the GREATEST() or LEAST() functions. An authenticated user could crash the server.\n\n - CVE-2010-3840 It was discovered that MySQL incorrectly handled improper WKB data passed to the PolyFromWKB() function.\n An authenticated user could crash the server.", "cvss3": {"score": null, "vector": null}, "published": "2011-01-17T00:00:00", "type": "nessus", "title": "Debian DSA-2143-1 : mysql-dfsg-5.0 - several vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3677", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3834", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3840"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:mysql-dfsg-5.0", "cpe:/o:debian:debian_linux:5.0"], "id": "DEBIAN_DSA-2143.NASL", "href": "https://www.tenable.com/plugins/nessus/51530", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2143. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51530);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3840\");\n script_bugtraq_id(42598, 42599, 42633, 42646, 43676);\n script_xref(name:\"DSA\", value:\"2143\");\n\n script_name(english:\"Debian DSA-2143-1 : mysql-dfsg-5.0 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the MySQL database\nserver. The Common Vulnerabilities and Exposures project identifies\nthe following problems :\n\n - CVE-2010-3677\n It was discovered that MySQL allows remote authenticated\n users to cause a denial of service (mysqld daemon crash)\n via a join query that uses a table with a unique SET\n column.\n\n - CVE-2010-3680\n It was discovered that MySQL allows remote authenticated\n users to cause a denial of service (mysqld daemon crash)\n by creating temporary tables while using InnoDB, which\n triggers an assertion failure.\n\n - CVE-2010-3681\n It was discovered that MySQL allows remote authenticated\n users to cause a denial of service (mysqld daemon crash)\n by using the HANDLER interface and performing 'alternate\n reads from two indexes on a table,' which triggers an\n assertion failure.\n\n - CVE-2010-3682\n It was discovered that MySQL incorrectly handled use of\n EXPLAIN with certain queries. An authenticated user\n could crash the server.\n\n - CVE-2010-3833\n It was discovered that MySQL incorrectly handled\n propagation during evaluation of arguments to\n extreme-value functions. An authenticated user could\n crash the server.\n\n - CVE-2010-3834\n It was discovered that MySQL incorrectly handled\n materializing a derived table that required a temporary\n table for grouping. An authenticated user could crash\n the server.\n\n - CVE-2010-3835\n It was discovered that MySQL incorrectly handled certain\n user-variable assignment expressions that are evaluated\n in a logical expression context. An authenticated user\n could crash the server.\n\n - CVE-2010-3836\n It was discovered that MySQL incorrectly handled\n pre-evaluation of LIKE predicates during view\n preparation. An authenticated user could crash the\n server.\n\n - CVE-2010-3837\n It was discovered that MySQL incorrectly handled using\n GROUP_CONCAT() and WITH ROLLUP together. An\n authenticated user could crash the server.\n\n - CVE-2010-3838\n It was discovered that MySQL incorrectly handled certain\n queries using a mixed list of numeric and LONGBLOB\n arguments to the GREATEST() or LEAST() functions. An\n authenticated user could crash the server.\n\n - CVE-2010-3840\n It was discovered that MySQL incorrectly handled\n improper WKB data passed to the PolyFromWKB() function.\n An authenticated user could crash the server.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-3677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-3680\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-3681\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-3682\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-3833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-3834\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-3835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-3836\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-3837\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-3838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-3840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2011/dsa-2143\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the mysql-dfsg-5.0 packages.\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 5.0.51a-24+lenny5.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:mysql-dfsg-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:5.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"5.0\", prefix:\"mysql-dfsg-5.0\", reference:\"5.0.51a-24+lenny5\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:02:25", "description": "Multiple vulnerabilities were discovered and corrected in mysql :\n\n - Joins involving a table with with a unique SET column could cause a server crash (CVE-2010-3677).\n\n - Use of TEMPORARY InnoDB tables with nullable columns could cause a server crash (CVE-2010-3680).\n\n - The server could crash if there were alternate reads from two indexes on a table using the HANDLER interface (CVE-2010-3681).\n\n - Using EXPLAIN with queries of the form SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...) could cause a server crash (CVE-2010-3682).\n\n - During evaluation of arguments to extreme-value functions (such as LEAST() and GREATEST()), type errors did not propagate properly, causing the server to crash (CVE-2010-3833).\n\n - The server could crash after materializing a derived table that required a temporary table for grouping (CVE-2010-3834).\n\n - A user-variable assignment expression that is evaluated in a logical expression context can be precalculated in a temporary table for GROUP BY. However, when the expression value is used after creation of the temporary table, it was re-evaluated, not read from the table and a server crash resulted (CVE-2010-3835).\n\n - Pre-evaluation of LIKE predicates during view preparation could cause a server crash (CVE-2010-3836).\n\n - GROUP_CONCAT() and WITH ROLLUP together could cause a server crash (CVE-2010-3837).\n\n - Queries could cause a server crash if the GREATEST() or LEAST() function had a mixed list of numeric and LONGBLOB arguments, and the result of such a function was processed using an intermediate temporary table (CVE-2010-3838).\n\n - Queries with nested joins could cause an infinite loop in the server when used from stored procedures and prepared statements (CVE-2010-3839).\n\n - The PolyFromWKB() function could crash the server when improper WKB data was passed to the function (CVE-2010-3840).\n\nAdditionally the default behaviour of using the mysqlmanager instead of the mysqld_safe script has been reverted in the SysV init script because of instability issues with the mysqlmanager.\n\nPackages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:\nhttp://store.mandriva.com/product_info.php?cPath=149&products_id=4 90\n\nThe updated packages have been upgraded to mysql 5.0.91 and patched to correct these issues.", "cvss3": {"score": null, "vector": null}, "published": "2010-11-10T00:00:00", "type": "nessus", "title": "Mandriva Linux Security Advisory : mysql (MDVSA-2010:222)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3677", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3834", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:lib64mysql-devel", "p-cpe:/a:mandriva:linux:lib64mysql-static-devel", "p-cpe:/a:mandriva:linux:lib64mysql15", "p-cpe:/a:mandriva:linux:libmysql-devel", "p-cpe:/a:mandriva:linux:libmysql-static-devel", "p-cpe:/a:mandriva:linux:libmysql15", "p-cpe:/a:mandriva:linux:mysql", "p-cpe:/a:mandriva:linux:mysql-bench", "p-cpe:/a:mandriva:linux:mysql-client", "p-cpe:/a:mandriva:linux:mysql-common", "p-cpe:/a:mandriva:linux:mysql-doc", "p-cpe:/a:mandriva:linux:mysql-max", "p-cpe:/a:mandriva:linux:mysql-ndb-extra", "p-cpe:/a:mandriva:linux:mysql-ndb-management", "p-cpe:/a:mandriva:linux:mysql-ndb-storage", "p-cpe:/a:mandriva:linux:mysql-ndb-tools", "cpe:/o:mandriva:linux:2009.0"], "id": "MANDRIVA_MDVSA-2010-222.NASL", "href": "https://www.tenable.com/plugins/nessus/50533", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2010:222. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50533);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_bugtraq_id(42598, 42599, 42633, 42646, 43676);\n script_xref(name:\"MDVSA\", value:\"2010:222\");\n\n script_name(english:\"Mandriva Linux Security Advisory : mysql (MDVSA-2010:222)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered and corrected in mysql :\n\n - Joins involving a table with with a unique SET column\n could cause a server crash (CVE-2010-3677).\n\n - Use of TEMPORARY InnoDB tables with nullable columns\n could cause a server crash (CVE-2010-3680).\n\n - The server could crash if there were alternate reads\n from two indexes on a table using the HANDLER interface\n (CVE-2010-3681).\n\n - Using EXPLAIN with queries of the form SELECT ... UNION\n ... ORDER BY (SELECT ... WHERE ...) could cause a server\n crash (CVE-2010-3682).\n\n - During evaluation of arguments to extreme-value\n functions (such as LEAST() and GREATEST()), type errors\n did not propagate properly, causing the server to crash\n (CVE-2010-3833).\n\n - The server could crash after materializing a derived\n table that required a temporary table for grouping\n (CVE-2010-3834).\n\n - A user-variable assignment expression that is evaluated\n in a logical expression context can be precalculated in\n a temporary table for GROUP BY. However, when the\n expression value is used after creation of the temporary\n table, it was re-evaluated, not read from the table and\n a server crash resulted (CVE-2010-3835).\n\n - Pre-evaluation of LIKE predicates during view\n preparation could cause a server crash (CVE-2010-3836).\n\n - GROUP_CONCAT() and WITH ROLLUP together could cause a\n server crash (CVE-2010-3837).\n\n - Queries could cause a server crash if the GREATEST() or\n LEAST() function had a mixed list of numeric and\n LONGBLOB arguments, and the result of such a function\n was processed using an intermediate temporary table\n (CVE-2010-3838).\n\n - Queries with nested joins could cause an infinite loop\n in the server when used from stored procedures and\n prepared statements (CVE-2010-3839).\n\n - The PolyFromWKB() function could crash the server when\n improper WKB data was passed to the function\n (CVE-2010-3840).\n\nAdditionally the default behaviour of using the mysqlmanager instead\nof the mysqld_safe script has been reverted in the SysV init script\nbecause of instability issues with the mysqlmanager.\n\nPackages for 2009.0 are provided as of the Extended Maintenance\nProgram. Please visit this link to learn more:\nhttp://store.mandriva.com/product_info.php?cPath=149&products_id=4\n90\n\nThe updated packages have been upgraded to mysql 5.0.91 and patched to\ncorrect these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=51875\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=52711\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=53544\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=54007\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=54044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=54461\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=54476\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=54568\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=54575\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=55564\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=55568\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.mysql.com/bug.php?id=55826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64mysql-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64mysql15\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libmysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libmysql-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libmysql15\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-max\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-ndb-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-ndb-management\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-ndb-storage\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mysql-ndb-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/11/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64mysql-devel-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64mysql-static-devel-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64mysql15-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libmysql-devel-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libmysql-static-devel-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libmysql15-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"mysql-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"mysql-bench-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"mysql-client-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"mysql-common-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"mysql-doc-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"mysql-max-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"mysql-ndb-extra-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"mysql-ndb-management-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"mysql-ndb-storage-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"mysql-ndb-tools-5.0.91-0.1mdv2009.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-05-04T14:51:06", "description": "The remote host is affected by the vulnerability described in GLSA-201201-02 (MySQL: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in MySQL. Please review the CVE identifiers referenced below for details.\n Impact :\n\n An unauthenticated remote attacker may be able to execute arbitrary code with the privileges of the MySQL process, cause a Denial of Service condition, bypass security restrictions, uninstall arbitrary MySQL plugins, or conduct Man-in-the-Middle and Cross-Site Scripting attacks.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": null, "vector": null}, "published": "2012-01-06T00:00:00", "type": "nessus", "title": "GLSA-201201-02 : MySQL: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2008-3963", "CVE-2008-4097", "CVE-2008-4098", "CVE-2008-4456", "CVE-2008-7247", "CVE-2009-2446", "CVE-2009-4019", "CVE-2009-4028", "CVE-2009-4484", "CVE-2010-1621", "CVE-2010-1626", "CVE-2010-1848", "CVE-2010-1849", "CVE-2010-1850", "CVE-2010-2008", "CVE-2010-3676", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683", "CVE-2010-3833", "CVE-2010-3834", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:mysql", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201201-02.NASL", "href": "https://www.tenable.com/plugins/nessus/57446", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201201-02.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(57446);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2008-3963\", \"CVE-2008-4097\", \"CVE-2008-4098\", \"CVE-2008-4456\", \"CVE-2008-7247\", \"CVE-2009-2446\", \"CVE-2009-4019\", \"CVE-2009-4028\", \"CVE-2009-4484\", \"CVE-2010-1621\", \"CVE-2010-1626\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2010-2008\", \"CVE-2010-3676\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_bugtraq_id(29106, 31081, 31486, 35609, 37076, 37297, 37640, 37943, 38043, 39543, 40100, 40106, 40109, 40257, 41198, 42596, 42598, 42599, 42625, 42633, 42638, 42643, 42646, 43676);\n script_xref(name:\"GLSA\", value:\"201201-02\");\n\n script_name(english:\"GLSA-201201-02 : MySQL: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201201-02\n(MySQL: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in MySQL. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n An unauthenticated remote attacker may be able to execute arbitrary code\n with the privileges of the MySQL process, cause a Denial of Service\n condition, bypass security restrictions, uninstall arbitrary MySQL\n plugins, or conduct Man-in-the-Middle and Cross-Site Scripting attacks.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201201-02\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All MySQL users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-db/mysql-5.1.56'\n NOTE: This is a legacy GLSA. Updates for all affected architectures are\n available since May 14, 2011. It is likely that your system is already no\n longer affected by this issue.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'MySQL yaSSL CertDecoder::GetName Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'White_Phosphorus');\n script_cwe_id(20, 59, 79, 119, 134, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/01/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/01/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"dev-db/mysql\", unaffected:make_list(\"ge 5.1.56\"), vulnerable:make_list(\"lt 5.1.56\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MySQL\");\n}\n", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T13:02:19", "description": "The following bugs have been fixed :\n\n - local users could delete data files for tables of other users. (CVE-2010-1626)\n\n - authenticated users could gather information for tables they should not have access to. (CVE-2010-1849)\n\n - authenticated users could crash mysqld. (CVE-2010-3683, CVE-2010-3681, CVE-2010-1848)\n\n - authenticated users could bypass intended access restrictions. (CVE-2008-7247, CVE-2009-4030)", "cvss3": {"score": null, "vector": null}, "published": "2010-11-09T00:00:00", "type": "nessus", "title": "SuSE9 Security Update : MySQL (YOU Patch Number 12661)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2008-7247", "CVE-2009-4030", "CVE-2010-1626", "CVE-2010-1848", "CVE-2010-1849", "CVE-2010-3681", "CVE-2010-3683"], "modified": "2021-01-14T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE9_12661.NASL", "href": "https://www.tenable.com/plugins/nessus/50523", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50523);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-7247\", \"CVE-2009-4030\", \"CVE-2010-1626\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-3681\", \"CVE-2010-3683\");\n\n script_name(english:\"SuSE9 Security Update : MySQL (YOU Patch Number 12661)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 9 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The following bugs have been fixed :\n\n - local users could delete data files for tables of other\n users. (CVE-2010-1626)\n\n - authenticated users could gather information for tables\n they should not have access to. (CVE-2010-1849)\n\n - authenticated users could crash mysqld. (CVE-2010-3683,\n CVE-2010-3681, CVE-2010-1848)\n\n - authenticated users could bypass intended access\n restrictions. (CVE-2008-7247, CVE-2009-4030)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-7247.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-4030.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1626.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1848.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1849.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-3681.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-3683.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply YOU patch number 12661.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_cwe_id(59);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/10/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/11/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 9 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SUSE9\", reference:\"mysql-4.0.18-32.41\")) flag++;\nif (rpm_check(release:\"SUSE9\", reference:\"mysql-Max-4.0.18-32.41\")) flag++;\nif (rpm_check(release:\"SUSE9\", reference:\"mysql-client-4.0.18-32.41\")) flag++;\nif (rpm_check(release:\"SUSE9\", reference:\"mysql-devel-4.0.18-32.41\")) flag++;\nif (rpm_check(release:\"SUSE9\", reference:\"mysql-shared-4.0.18-32.41\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:02:16", "description": "Updated mysql packages that fix three security issues are now available for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity check Well-Known Binary (WKB) data. A remote, authenticated attacker could use specially crafted WKB data to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain alternating READ requests provided by HANDLER statements. A remote, authenticated attacker could use this flaw to provide such requests, causing mysqld to crash. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA directory traversal flaw was found in the way MySQL handled the parameters of the MySQL COM_FIELD_LIST network protocol command. A remote, authenticated attacker could use this flaw to obtain descriptions of the fields of an arbitrary table using a request with a specially crafted table name. (CVE-2010-1848)\n\nAll MySQL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2010-11-24T00:00:00", "type": "nessus", "title": "CentOS 4 : mysql (CESA-2010:0824)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1848", "CVE-2010-3681", "CVE-2010-3840"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:mysql", "p-cpe:/a:centos:centos:mysql-bench", "p-cpe:/a:centos:centos:mysql-devel", "p-cpe:/a:centos:centos:mysql-server", "cpe:/o:centos:centos:4"], "id": "CENTOS_RHSA-2010-0824.NASL", "href": "https://www.tenable.com/plugins/nessus/50805", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0824 and \n# CentOS Errata and Security Advisory 2010:0824 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50805);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2010-1848\", \"CVE-2010-3681\", \"CVE-2010-3840\");\n script_bugtraq_id(40109);\n script_xref(name:\"RHSA\", value:\"2010:0824\");\n\n script_name(english:\"CentOS 4 : mysql (CESA-2010:0824)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated mysql packages that fix three security issues are now\navailable for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity\ncheck Well-Known Binary (WKB) data. A remote, authenticated attacker\ncould use specially crafted WKB data to crash mysqld. This issue only\ncaused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain alternating READ\nrequests provided by HANDLER statements. A remote, authenticated\nattacker could use this flaw to provide such requests, causing mysqld\nto crash. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA directory traversal flaw was found in the way MySQL handled the\nparameters of the MySQL COM_FIELD_LIST network protocol command. A\nremote, authenticated attacker could use this flaw to obtain\ndescriptions of the fields of an arbitrary table using a request with\na specially crafted table name. (CVE-2010-1848)\n\nAll MySQL users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After\ninstalling this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-November/017142.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9d772b6f\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-November/017143.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d69f58b8\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mysql packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/06/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/11/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"mysql-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"mysql-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"mysql-bench-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"mysql-bench-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"mysql-devel-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"mysql-devel-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"mysql-server-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"mysql-server-4.1.22-2.el4_8.4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-devel / mysql-server\");\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:02:36", "description": "Updated mysql packages that fix three security issues are now available for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity check Well-Known Binary (WKB) data. A remote, authenticated attacker could use specially crafted WKB data to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain alternating READ requests provided by HANDLER statements. A remote, authenticated attacker could use this flaw to provide such requests, causing mysqld to crash. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA directory traversal flaw was found in the way MySQL handled the parameters of the MySQL COM_FIELD_LIST network protocol command. A remote, authenticated attacker could use this flaw to obtain descriptions of the fields of an arbitrary table using a request with a specially crafted table name. (CVE-2010-1848)\n\nAll MySQL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2010-11-04T00:00:00", "type": "nessus", "title": "RHEL 4 : mysql (RHSA-2010:0824)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1848", "CVE-2010-3681", "CVE-2010-3840"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:mysql", "p-cpe:/a:redhat:enterprise_linux:mysql-bench", "p-cpe:/a:redhat:enterprise_linux:mysql-devel", "p-cpe:/a:redhat:enterprise_linux:mysql-server", "cpe:/o:redhat:enterprise_linux:4", "cpe:/o:redhat:enterprise_linux:4.8"], "id": "REDHAT-RHSA-2010-0824.NASL", "href": "https://www.tenable.com/plugins/nessus/50473", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0824. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50473);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-1848\", \"CVE-2010-3681\", \"CVE-2010-3840\");\n script_bugtraq_id(40109);\n script_xref(name:\"RHSA\", value:\"2010:0824\");\n\n script_name(english:\"RHEL 4 : mysql (RHSA-2010:0824)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated mysql packages that fix three security issues are now\navailable for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity\ncheck Well-Known Binary (WKB) data. A remote, authenticated attacker\ncould use specially crafted WKB data to crash mysqld. This issue only\ncaused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain alternating READ\nrequests provided by HANDLER statements. A remote, authenticated\nattacker could use this flaw to provide such requests, causing mysqld\nto crash. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA directory traversal flaw was found in the way MySQL handled the\nparameters of the MySQL COM_FIELD_LIST network protocol command. A\nremote, authenticated attacker could use this flaw to obtain\ndescriptions of the fields of an arbitrary table using a request with\na specially crafted table name. (CVE-2010-1848)\n\nAll MySQL users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After\ninstalling this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-1848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3681\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2010:0824\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4.8\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/06/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/11/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2010:0824\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"mysql-4.1.22-2.el4_8.4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"mysql-bench-4.1.22-2.el4_8.4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"mysql-devel-4.1.22-2.el4_8.4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"mysql-server-4.1.22-2.el4_8.4\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-devel / mysql-server\");\n }\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:54:07", "description": "From Red Hat Security Advisory 2010:0824 :\n\nUpdated mysql packages that fix three security issues are now available for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity check Well-Known Binary (WKB) data. A remote, authenticated attacker could use specially crafted WKB data to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain alternating READ requests provided by HANDLER statements. A remote, authenticated attacker could use this flaw to provide such requests, causing mysqld to crash. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA directory traversal flaw was found in the way MySQL handled the parameters of the MySQL COM_FIELD_LIST network protocol command. A remote, authenticated attacker could use this flaw to obtain descriptions of the fields of an arbitrary table using a request with a specially crafted table name. (CVE-2010-1848)\n\nAll MySQL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2013-07-12T00:00:00", "type": "nessus", "title": "Oracle Linux 4 : mysql (ELSA-2010-0824)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1848", "CVE-2010-3681", "CVE-2010-3840"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:mysql", "p-cpe:/a:oracle:linux:mysql-bench", "p-cpe:/a:oracle:linux:mysql-devel", "p-cpe:/a:oracle:linux:mysql-server", "cpe:/o:oracle:linux:4"], "id": "ORACLELINUX_ELSA-2010-0824.NASL", "href": "https://www.tenable.com/plugins/nessus/68133", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2010:0824 and \n# Oracle Linux Security Advisory ELSA-2010-0824 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68133);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-1848\", \"CVE-2010-3681\", \"CVE-2010-3840\");\n script_bugtraq_id(40109);\n script_xref(name:\"RHSA\", value:\"2010:0824\");\n\n script_name(english:\"Oracle Linux 4 : mysql (ELSA-2010-0824)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2010:0824 :\n\nUpdated mysql packages that fix three security issues are now\navailable for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists\nof the MySQL server daemon (mysqld) and many client programs and\nlibraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity\ncheck Well-Known Binary (WKB) data. A remote, authenticated attacker\ncould use specially crafted WKB data to crash mysqld. This issue only\ncaused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain alternating READ\nrequests provided by HANDLER statements. A remote, authenticated\nattacker could use this flaw to provide such requests, causing mysqld\nto crash. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA directory traversal flaw was found in the way MySQL handled the\nparameters of the MySQL COM_FIELD_LIST network protocol command. A\nremote, authenticated attacker could use this flaw to obtain\ndescriptions of the fields of an arbitrary table using a request with\na specially crafted table name. (CVE-2010-1848)\n\nAll MySQL users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After\ninstalling this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2010-November/001722.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mysql packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-bench\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/06/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 4\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL4\", reference:\"mysql-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"mysql-bench-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"mysql-devel-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"mysql-server-4.1.22-2.el4_8.4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql / mysql-bench / mysql-devel / mysql-server\");\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:57:58", "description": "It was found that the MySQL PolyFromWKB() function did not sanity check Well-Known Binary (WKB) data. A remote, authenticated attacker could use specially crafted WKB data to crash mysqld. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain alternating READ requests provided by HANDLER statements. A remote, authenticated attacker could use this flaw to provide such requests, causing mysqld to crash. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA directory traversal flaw was found in the way MySQL handled the parameters of the MySQL COM_FIELD_LIST network protocol command. A remote, authenticated attacker could use this flaw to obtain descriptions of the fields of an arbitrary table using a request with a specially crafted table name. (CVE-2010-1848)\n\nAfter installing this update, the MySQL server daemon (mysqld) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2012-08-01T00:00:00", "type": "nessus", "title": "Scientific Linux Security Update : mysql on SL4.x i386/x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1848", "CVE-2010-3681", "CVE-2010-3840"], "modified": "2021-01-14T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20101103_MYSQL_ON_SL4_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60883", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60883);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-1848\", \"CVE-2010-3681\", \"CVE-2010-3840\");\n\n script_name(english:\"Scientific Linux Security Update : mysql on SL4.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was found that the MySQL PolyFromWKB() function did not sanity\ncheck Well-Known Binary (WKB) data. A remote, authenticated attacker\ncould use specially crafted WKB data to crash mysqld. This issue only\ncaused a temporary denial of service, as mysqld was automatically\nrestarted after the crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain alternating READ\nrequests provided by HANDLER statements. A remote, authenticated\nattacker could use this flaw to provide such requests, causing mysqld\nto crash. This issue only caused a temporary denial of service, as\nmysqld was automatically restarted after the crash. (CVE-2010-3681)\n\nA directory traversal flaw was found in the way MySQL handled the\nparameters of the MySQL COM_FIELD_LIST network protocol command. A\nremote, authenticated attacker could use this flaw to obtain\ndescriptions of the fields of an arbitrary table using a request with\na specially crafted table name. (CVE-2010-1848)\n\nAfter installing this update, the MySQL server daemon (mysqld) will be\nrestarted automatically.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1011&L=scientific-linux-errata&T=0&P=314\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6b5cf80d\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL4\", reference:\"mysql-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"mysql-bench-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"mysql-devel-4.1.22-2.el4_8.4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"mysql-server-4.1.22-2.el4_8.4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2022-05-04T14:54:17", "description": "Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues.\n\nMySQL has been updated to 5.1.61 in Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS has been updated to MySQL 5.0.95.\n\nIn addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.\n\nPlease see the following for more information :\n\nhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.ht ml.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2012-03-13T00:00:00", "type": "nessus", "title": "Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities (USN-1397-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5925", "CVE-2008-3963", "CVE-2008-4098", "CVE-2008-4456", "CVE-2008-7247", "CVE-2009-2446", "CVE-2009-4019", "CVE-2009-4030", "CVE-2009-4484", "CVE-2010-1621", "CVE-2010-1626", "CVE-2010-1848", "CVE-2010-1849", "CVE-2010-1850", "CVE-2010-2008", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683", "CVE-2010-3833", "CVE-2010-3834", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840", "CVE-2011-2262", "CVE-2012-0075", "CVE-2012-0087", "CVE-2012-0101", "CVE-2012-0102", "CVE-2012-0112", "CVE-2012-0113", "CVE-2012-0114", "CVE-2012-0115", "CVE-2012-0116", "CVE-2012-0117", "CVE-2012-0118", "CVE-2012-0119", "CVE-2012-0120", "CVE-2012-0484", "CVE-2012-0485", "CVE-2012-0486", "CVE-2012-0487", "CVE-2012-0488", "CVE-2012-0489", "CVE-2012-0490", "CVE-2012-0491", "CVE-2012-0492", "CVE-2012-0493", "CVE-2012-0494", "CVE-2012-0495", "CVE-2012-0496"], "modified": "2019-09-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.1", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:10.10", "cpe:/o:canonical:ubuntu_linux:11.04", "cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:canonical:ubuntu_linux:8.04:-:lts"], "id": "UBUNTU_USN-1397-1.NASL", "href": "https://www.tenable.com/plugins/nessus/58325", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1397-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(58325);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/09/19 12:54:27\");\n\n script_cve_id(\"CVE-2007-5925\", \"CVE-2008-3963\", \"CVE-2008-4098\", \"CVE-2008-4456\", \"CVE-2008-7247\", \"CVE-2009-2446\", \"CVE-2009-4019\", \"CVE-2009-4030\", \"CVE-2009-4484\", \"CVE-2010-1621\", \"CVE-2010-1626\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2010-2008\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\", \"CVE-2011-2262\", \"CVE-2012-0075\", \"CVE-2012-0087\", \"CVE-2012-0101\", \"CVE-2012-0102\", \"CVE-2012-0112\", \"CVE-2012-0113\", \"CVE-2012-0114\", \"CVE-2012-0115\", \"CVE-2012-0116\", \"CVE-2012-0117\", \"CVE-2012-0118\", \"CVE-2012-0119\", \"CVE-2012-0120\", \"CVE-2012-0484\", \"CVE-2012-0485\", \"CVE-2012-0486\", \"CVE-2012-0487\", \"CVE-2012-0488\", \"CVE-2012-0489\", \"CVE-2012-0490\", \"CVE-2012-0491\", \"CVE-2012-0492\", \"CVE-2012-0493\", \"CVE-2012-0494\", \"CVE-2012-0495\", \"CVE-2012-0496\");\n script_bugtraq_id(26353, 29106, 31081, 31486, 35609, 37075, 37297, 37640, 37943, 38043, 39543, 40100, 40106, 40109, 40257, 41198, 42596, 42598, 42599, 42625, 42633, 42638, 42646, 43676, 51488, 51493, 51502, 51504, 51505, 51508, 51509, 51519, 51520, 51526);\n script_xref(name:\"USN\", value:\"1397-1\");\n\n script_name(english:\"Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities (USN-1397-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple security issues were discovered in MySQL and this update\nincludes new upstream MySQL versions to fix these issues.\n\nMySQL has been updated to 5.1.61 in Ubuntu 10.04 LTS, Ubuntu 10.10,\nUbuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS has been updated to\nMySQL 5.0.95.\n\nIn addition to security fixes, the updated packages contain bug fixes,\nnew features, and possibly incompatible changes.\n\nPlease see the following for more information :\n\nhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html\nhttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html\nhttp://www.oracle.com/technetwork/topics/security/cpujan2012-366304.ht\nml.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1397-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected mysql-server-5.0 and / or mysql-server-5.1\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'MySQL yaSSL CertDecoder::GetName Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'White_Phosphorus');\n script_cwe_id(20, 59, 79, 119, 134);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/11/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/03/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/03/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2012-2019 Canonical, Inc. / NASL script (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(8\\.04|10\\.04|10\\.10|11\\.04|11\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 8.04 / 10.04 / 10.10 / 11.04 / 11.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"8.04\", pkgname:\"mysql-server-5.0\", pkgver:\"5.0.95-0ubuntu1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"mysql-server-5.1\", pkgver:\"5.1.61-0ubuntu0.10.04.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"mysql-server-5.1\", pkgver:\"5.1.61-0ubuntu0.10.10.1\")) flag++;\nif (ubuntu_check(osver:\"11.04\", pkgname:\"mysql-server-5.1\", pkgver:\"5.1.61-0ubuntu0.11.04.1\")) flag++;\nif (ubuntu_check(osver:\"11.10\", pkgname:\"mysql-server-5.1\", pkgver:\"5.1.61-0ubuntu0.11.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql-server-5.0 / mysql-server-5.1\");\n}\n", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T13:03:35", "description": "- Update to MySQL 5.1.48, for various fixes described at http://dev.mysql.com/doc/refman/5.1/en/news-5-1-48.html including a fix for CVE-2010-2008 Related: #614214 - Duplicate COPYING and EXCEPTIONS-CLIENT in -libs and\n -embedded subpackages, to ensure they are available when any subset of mysql RPMs are installed, per revised packaging guidelines - Allow init script's STARTTIMEOUT/STOPTIMEOUT to be overridden from sysconfig Related: #609734\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2010-07-27T00:00:00", "type": "nessus", "title": "Fedora 13 : mysql-5.1.48-2.fc13 (2010-11135)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:mysql", "cpe:/o:fedoraproject:fedora:13"], "id": "FEDORA_2010-11135.NASL", "href": "https://www.tenable.com/plugins/nessus/47840", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2010-11135.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(47840);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2010-2008\");\n script_bugtraq_id(40100, 40106, 40109, 41198);\n script_xref(name:\"FEDORA\", value:\"2010-11135\");\n\n script_name(english:\"Fedora 13 : mysql-5.1.48-2.fc13 (2010-11135)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Update to MySQL 5.1.48, for various fixes described at\n http://dev.mysql.com/doc/refman/5.1/en/news-5-1-48.html\n including a fix for CVE-2010-2008 Related: #614214 -\n Duplicate COPYING and EXCEPTIONS-CLIENT in -libs and\n -embedded subpackages, to ensure they are available when\n any subset of mysql RPMs are installed, per revised\n packaging guidelines - Allow init script's\n STARTTIMEOUT/STOPTIMEOUT to be overridden from sysconfig\n Related: #609734\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://dev.mysql.com/doc/refman/5.1/en/news-5-1-48.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://dev.mysql.com/doc/refman/5.1/en/news-5-1-48.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=614214\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2010-July/044546.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d544d065\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected mysql package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:13\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/07/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/07/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^13([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 13.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC13\", reference:\"mysql-5.1.48-2.fc13\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql\");\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-10-16T15:29:34", "description": "The version of MySQL Community Server installed on the remote host is earlier than 5.1.48 and thus potentially affected by a denial of service vulnerability.\n\nThe 'ALTER DATABASE' command can be misused by a user with 'ALTER' permissions to cause the MySQL data directory to become unusable.", "cvss3": {"score": null, "vector": null}, "published": "2010-06-29T00:00:00", "type": "nessus", "title": "MySQL Community Server < 5.1.48 Denial of Service", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008"], "modified": "2018-11-15T00:00:00", "cpe": ["cpe:/a:mysql:mysql"], "id": "MYSQL_5_1_48.NASL", "href": "https://www.tenable.com/plugins/nessus/47158", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(47158);\n script_version(\"1.12\");\n script_cvs_date(\"Date: 2018/11/15 20:50:21\");\n\n script_cve_id(\"CVE-2010-2008\");\n script_bugtraq_id(41198);\n script_xref(name:\"Secunia\", value:\"40333\");\n\n script_name(english:\"MySQL Community Server < 5.1.48 Denial of Service\");\n script_summary(english:\"Checks version of MySQL 5.1 Server\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote database server is affected by denial of service\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of MySQL Community Server installed on the remote host is\nearlier than 5.1.48 and thus potentially affected by a denial of\nservice vulnerability.\n\nThe 'ALTER DATABASE' command can be misused by a user with 'ALTER'\npermissions to cause the MySQL data directory to become unusable.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.mysql.com/bug.php?id=53804\");\n script_set_attribute(attribute:\"see_also\", value:\"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-48.html\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to MySQL Community Server 5.1.48 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/06/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/06/29\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mysql:mysql\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Databases\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mysql_version.nasl\", \"mysql_login.nasl\");\n script_require_keys(\"Settings/ParanoidReport\");\n script_require_ports(\"Services/mysql\", 3306);\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"mysql_func.inc\");\n\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\n\nport = get_service(svc:\"mysql\", default:3306, exit_on_fail:TRUE);\nvuln = FALSE;\n\nif (mysql_init(port:port, exit_on_fail:TRUE) == 1)\n{\n variant = mysql_get_variant();\n version = mysql_get_version();\n ver_fields = split(version, sep:'.', keep:FALSE);\n major = int(ver_fields[0]);\n minor = int(ver_fields[1]);\n rev = int(ver_fields[2]);\n\n if (\n !isnull(variant) && \"Community\" >< variant &&\n strlen(version) &&\n major == 5 && minor == 1 && rev < 48\n ) vuln = TRUE;\n}\nelse exit(1, \"Can't establish a MySQL connection on port \"+port+\".\");\nmysql_close();\n\nif (vuln)\n{\n if (report_verbosity > 0)\n {\n report = '\\n Installed version : ' + version +\n '\\n Fixed version : 5.1.48\\n';\n datadir = get_kb_item('mysql/' + port + '/datadir');\n if (!empty_or_null(datadir))\n {\n report += ' Data Dir : ' + datadir + '\\n';\n }\n databases = get_kb_item('mysql/' + port + '/databases');\n if (!empty_or_null(databases))\n { \n report += ' Databases :\\n' + databases;\n }\n security_note(port:port, extra:report);\n }\n else security_note(port);\n exit(0);\n}\nelse\n{\n if (isnull(variant)) exit(1, \"Can't determine the variant of MySQL listening on port \"+port+\".\");\n else if (\"Community\" >< variant) exit(0, \"MySQL version \"+version+\" is listening on port \"+port+\" and is not affected.\");\n else exit(0, \"MySQL \"+variant+\" is listening on port \"+port+\" and is not affected.\");\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:03:50", "description": "Versions of MySQL Community Server 5.1 earlier than 5.1.48 are potentially affected by a denial-of-service vulnerability. The 'ALTER DATABASE' command can be misused by a user with 'ALTER' privileges to cause the MySQL data directory to become unusable.", "cvss3": {"score": null, "vector": null}, "published": "2010-06-29T00:00:00", "type": "nessus", "title": "MySQL Community Server 5.1 < 5.1.48 Denial of Service Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008"], "modified": "2010-06-29T00:00:00", "cpe": [], "id": "801120.PRM", "href": "https://www.tenable.com/plugins/lce/801120", "sourceData": "Binary data 801120.prm", "cvss": {"score": 4, "vector": "CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:03:50", "description": "Versions of MySQL Community Server 5.1 earlier than 5.1.48 are potentially affected by a denial-of-service vulnerability. The 'ALTER DATABASE' command can be misused by a user with 'ALTER' privileges to cause the MySQL data directory to become unusable.", "cvss3": {"score": 4.3, "vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}, "published": "2010-06-29T00:00:00", "type": "nessus", "title": "MySQL Community Server 5.1 < 5.1.48 Denial of Service Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:a:mysql:community_server:*:*:*:*:*:*:*:*"], "id": "5588.PRM", "href": "https://www.tenable.com/plugins/nnm/5588", "sourceData": "Binary data 5588.prm", "cvss": {"score": 4, "vector": "CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:03:46", "description": "Add backported patch for CVE-2010-2008\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2010-08-03T00:00:00", "type": "nessus", "title": "Fedora 12 : mysql-5.1.47-2.fc12 (2010-11126)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:mysql", "cpe:/o:fedoraproject:fedora:12"], "id": "FEDORA_2010-11126.NASL", "href": "https://www.tenable.com/plugins/nessus/48226", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2010-11126.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(48226);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2010-2008\");\n script_bugtraq_id(41198);\n script_xref(name:\"FEDORA\", value:\"2010-11126\");\n\n script_name(english:\"Fedora 12 : mysql-5.1.47-2.fc12 (2010-11126)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Add backported patch for CVE-2010-2008\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=614214\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2010-August/044875.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?092f6066\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected mysql package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:12\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/07/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/08/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^12([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 12.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC12\", reference:\"mysql-5.1.47-2.fc12\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql\");\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:00:14", "description": "The remote host is running a version of Mac OS X 10.5 that does not have Security Update 2011-004 applied. This update contains security- related fixes for the following components :\n\n - AirPort\n - App Store\n - ColorSync\n - CoreGraphics\n - ImageIO\n - Libsystem\n - libxslt\n - MySQL\n - patch\n - Samba\n - servermgrd\n - subversion", "cvss3": {"score": null, "vector": null}, "published": "2011-06-24T00:00:00", "type": "nessus", "title": "Mac OS X Multiple Vulnerabilities (Security Update 2011-004)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2632", "CVE-2010-3069", "CVE-2010-3677", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3834", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-4651", "CVE-2011-0195", "CVE-2011-0196", "CVE-2011-0197", "CVE-2011-0200", "CVE-2011-0202", "CVE-2011-0204", "CVE-2011-0205", "CVE-2011-0212", "CVE-2011-0715", "CVE-2011-0719"], "modified": "2018-07-14T00:00:00", "cpe": ["cpe:/o:apple:mac_os_x"], "id": "MACOSX_SECUPD2011-004.NASL", "href": "https://www.tenable.com/plugins/nessus/55415", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(55415);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2018/07/14 1:59:35\");\n\n script_cve_id(\n \"CVE-2010-2632\",\n \"CVE-2010-3069\",\n \"CVE-2010-3677\",\n \"CVE-2010-3682\",\n \"CVE-2010-3833\",\n \"CVE-2010-3834\",\n \"CVE-2010-3835\",\n \"CVE-2010-3836\",\n \"CVE-2010-3837\",\n \"CVE-2010-3838\",\n \"CVE-2010-4651\",\n \"CVE-2011-0195\",\n \"CVE-2011-0196\",\n \"CVE-2011-0197\",\n \"CVE-2011-0200\",\n \"CVE-2011-0202\",\n \"CVE-2011-0204\",\n \"CVE-2011-0205\",\n \"CVE-2011-0212\",\n \"CVE-2011-0715\",\n \"CVE-2011-0719\"\n );\n script_bugtraq_id(\n 42599,\n 42646,\n 43212,\n 43676,\n 43819,\n 46597,\n 46734,\n 46768,\n 47668,\n 48415,\n 48416,\n 48427,\n 48437,\n 48439,\n 48443,\n 48445\n );\n\n script_name(english:\"Mac OS X Multiple Vulnerabilities (Security Update 2011-004)\");\n script_summary(english:\"Check for the presence of Security Update 2011-004\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a Mac OS X update that fixes several\nsecurity issues.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is running a version of Mac OS X 10.5 that does not\nhave Security Update 2011-004 applied. This update contains security-\nrelated fixes for the following components :\n\n - AirPort\n - App Store\n - ColorSync\n - CoreGraphics\n - ImageIO\n - Libsystem\n - libxslt\n - MySQL\n - patch\n - Samba\n - servermgrd\n - subversion\");\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT4723\");\n script_set_attribute(attribute:\"see_also\", value:\"http://lists.apple.com/archives/security-announce/2011/Jun/msg00000.html\");\n script_set_attribute(attribute:\"solution\", value:\"Install Security Update 2011-004 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/08/24\"); \n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/06/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/06/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:apple:mac_os_x\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/packages\", \"Host/MacOSX/Version\");\n\n exit(0);\n}\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\n\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (!os) exit(0, \"The host does not appear to be running Mac OS X.\");\n\n\nif (ereg(pattern:\"Mac OS X 10\\.5([^0-9]|$)\", string:os))\n{\n packages = get_kb_item(\"Host/MacOSX/packages/boms\");\n if (!packages) exit(1, \"The 'Host/MacOSX/packages/boms' KB item is missing.\");\n\n if (egrep(pattern:\"^com\\.apple\\.pkg\\.update\\.security\\.(2011\\.00[4-9]|201[2-9]\\.[0-9]+)(\\.leopard)?\\.bom\", string:packages))\n exit(0, \"The host has Security Update 2011-004 or later installed and therefore is not affected.\");\n else\n security_hole(0);\n}\nelse exit(0, \"The host is running \"+os+\" and therefore is not affected.\");\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T13:00:10", "description": "Versions of Mac OS X 10.6 earlier than 10.6.8 are potentially affected by a security issue. Mac OS X 10.6.8 contains a security fix for the following products :\n\n - App Store\n\n - ATS\n\n - Certificate Trust Policy\n\n - CoreFoundation\n\n - CoreGraphics\n\n - FTP Server\n\n - ImageIO\n\n - International Components for Unicode\n\n - Kernel\n\n - Libsystem\n\n - libxslt\n\n - MobileMe\n\n - MySQL\n\n - OpenSSL\n\n - patch\n\n - QuickLook\n\n - QuickTime\n\n - Samba\n\n - servermgrd\n\n - subversion\nIAVA Reference : 2011-A-0160\nIAVB Reference : 2012-B-0038\nSTIG Finding Severity : Category I", "cvss3": {"score": null, "vector": null}, "published": "2011-06-23T00:00:00", "type": "nessus", "title": "Mac OS X 10.6 < 10.6.8 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4651", "CVE-2010-4180", "CVE-2011-0014", "CVE-2010-3677", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2009-3245", "CVE-2011-0715", "CVE-2010-3864", "CVE-2011-0719", "CVE-2010-0740", "CVE-2010-3834", "CVE-2011-0195", "CVE-2010-2632", "CVE-2011-0197", "CVE-2011-0205", "CVE-2011-0206", "CVE-2010-3790", "CVE-2011-1132", "CVE-2011-0202", "CVE-2011-0210", "CVE-2011-0212", "CVE-2011-0198", "CVE-2011-0201", "CVE-2011-0208", "CVE-2011-0207", "CVE-2011-0213", "CVE-2011-0211", "CVE-2011-0203", "CVE-2011-0209", "CVE-2011-0204", "CVE-2011-0199"], "modified": "2011-06-23T00:00:00", "cpe": [], "id": "800790.PRM", "href": "https://www.tenable.com/plugins/lce/800790", "sourceData": "Binary data 800790.prm", "cvss": {"score": 10, "vector": "CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-16T15:16:12", "description": "The remote host is running a version of Mac OS X 10.6.x that is prior to 10.6.8. This update contains security-related fixes for the following components :\n\n - App Store\n - ATS\n - Certificate Trust Policy\n - CoreFoundation\n - CoreGraphics\n - FTP Server\n - ImageIO\n - International Components for Unicode\n - Kernel\n - Libsystem\n - libxslt\n - MobileMe\n - MySQL\n - OpenSSL\n - patch\n - QuickLook\n - QuickTime\n - Samba\n - servermgrd\n - subversion", "cvss3": {"score": null, "vector": null}, "published": "2011-06-24T00:00:00", "type": "nessus", "title": "Mac OS X 10.6.x < 10.6.8 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-3245", "CVE-2010-0740", "CVE-2010-2632", "CVE-2010-3677", "CVE-2010-3682", "CVE-2010-3790", "CVE-2010-3833", "CVE-2010-3834", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3864", "CVE-2010-4180", "CVE-2010-4651", "CVE-2011-0014", "CVE-2011-0195", "CVE-2011-0197", "CVE-2011-0198", "CVE-2011-0199", "CVE-2011-0201", "CVE-2011-0202", "CVE-2011-0203", "CVE-2011-0204", "CVE-2011-0205", "CVE-2011-0206", "CVE-2011-0207", "CVE-2011-0208", "CVE-2011-0209", "CVE-2011-0210", "CVE-2011-0211", "CVE-2011-0212", "CVE-2011-0213", "CVE-2011-0715", "CVE-2011-0719", "CVE-2011-1132"], "modified": "2018-08-22T00:00:00", "cpe": ["cpe:/o:apple:mac_os_x"], "id": "MACOSX_10_6_8.NASL", "href": "https://www.tenable.com/plugins/nessus/55416", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(55416);\n script_version(\"1.20\");\n script_cvs_date(\"Date: 2018/08/22 16:49:14\");\n\n script_cve_id(\n \"CVE-2009-3245\",\n \"CVE-2010-0740\",\n \"CVE-2010-2632\",\n \"CVE-2010-3677\",\n \"CVE-2010-3682\",\n \"CVE-2010-3790\",\n \"CVE-2010-3833\",\n \"CVE-2010-3834\",\n \"CVE-2010-3835\",\n \"CVE-2010-3836\",\n \"CVE-2010-3837\",\n \"CVE-2010-3838\",\n \"CVE-2010-3864\",\n \"CVE-2010-4180\",\n \"CVE-2010-4651\",\n \"CVE-2011-0014\",\n \"CVE-2011-0195\",\n \"CVE-2011-0197\",\n \"CVE-2011-0198\",\n \"CVE-2011-0199\",\n \"CVE-2011-0201\",\n \"CVE-2011-0202\",\n \"CVE-2011-0203\",\n \"CVE-2011-0204\",\n \"CVE-2011-0205\",\n \"CVE-2011-0206\",\n \"CVE-2011-0207\",\n \"CVE-2011-0208\",\n \"CVE-2011-0209\",\n \"CVE-2011-0210\",\n \"CVE-2011-0211\",\n \"CVE-2011-0212\",\n \"CVE-2011-0213\",\n \"CVE-2011-0715\",\n \"CVE-2011-0719\",\n \"CVE-2011-1132\"\n );\n script_bugtraq_id(\n 38562,\n 39013,\n 42599,\n 42646,\n 43676,\n 43819,\n 44794,\n 44884,\n 45164,\n 46264,\n 46597,\n 46734,\n 46768,\n 47668,\n 48418,\n 48419,\n 48420,\n 48422,\n 48426,\n 48427,\n 48429,\n 48430,\n 48436,\n 48437,\n 48439,\n 48440,\n 48442,\n 48443,\n 48444,\n 48445,\n 48447\n );\n\n script_name(english:\"Mac OS X 10.6.x < 10.6.8 Multiple Vulnerabilities\");\n script_summary(english:\"Check the version of Mac OS X\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote host is missing a Mac OS X update that fixes several\nsecurity issues.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote host is running a version of Mac OS X 10.6.x that is prior\nto 10.6.8. This update contains security-related fixes for the\nfollowing components :\n\n - App Store\n - ATS\n - Certificate Trust Policy\n - CoreFoundation\n - CoreGraphics\n - FTP Server\n - ImageIO\n - International Components for Unicode\n - Kernel\n - Libsystem\n - libxslt\n - MobileMe\n - MySQL\n - OpenSSL\n - patch\n - QuickLook\n - QuickTime\n - Samba\n - servermgrd\n - subversion\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT4723\");\n script_set_attribute(attribute:\"see_also\", value:\"http://lists.apple.com/archives/security-announce/2011/Jun/msg00000.html\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Mac OS X 10.6.8 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(20);\n; # CVE-2009-3245\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/02/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/06/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/06/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:apple:mac_os_x\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"os_fingerprint.nasl\");\n\n exit(0);\n}\n\n\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (!os)\n{\n os = get_kb_item(\"Host/OS\");\n if (isnull(os)) exit(0, \"The 'Host/OS' KB item is missing.\");\n if (\"Mac OS X\" >!< os) exit(0, \"The host does not appear to be running Mac OS X.\");\n\n c = get_kb_item(\"Host/OS/Confidence\");\n if (c <= 70) exit(1, \"Can't determine the host's OS with sufficient confidence.\");\n}\nif (!os) exit(0, \"The host does not appear to be running Mac OS X.\");\n\n\nif (ereg(pattern:\"Mac OS X 10\\.6($|\\.[0-7]([^0-9]|$))\", string:os)) security_hole(0);\nelse exit(0, \"The host is not affected as it is running \"+os+\".\");\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T13:00:10", "description": "Versions of Mac OS X 10.6 earlier than 10.6.8 are potentially affected by a security issue. Mac OS X 10.6.8 contains a security fix for the following products :\n\n - App Store\n\n - ATS\n\n - Certificate Trust Policy\n\n - CoreFoundation\n\n - CoreGraphics\n\n - FTP Server\n\n - ImageIO\n\n - International Components for Unicode\n\n - Kernel\n\n - Libsystem\n\n - libxslt\n\n - MobileMe\n\n - MySQL\n\n - OpenSSL\n\n - patch\n\n - QuickLook\n\n - QuickTime\n\n - Samba\n\n - servermgrd\n\n - subversion", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2011-06-23T00:00:00", "type": "nessus", "title": "Mac OS X 10.6 < 10.6.8 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4651", "CVE-2010-4180", "CVE-2011-0014", "CVE-2010-3677", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2009-3245", "CVE-2011-0715", "CVE-2010-3864", "CVE-2011-0719", "CVE-2010-0740", "CVE-2010-3834", "CVE-2011-0195", "CVE-2010-2632", "CVE-2011-0197", "CVE-2011-0205", "CVE-2011-0206", "CVE-2010-3790", "CVE-2011-1132", "CVE-2011-0202", "CVE-2011-0210", "CVE-2011-0212", "CVE-2011-0198", "CVE-2011-0201", "CVE-2011-0208", "CVE-2011-0207", "CVE-2011-0213", "CVE-2011-0211", "CVE-2011-0203", "CVE-2011-0209", "CVE-2011-0204", "CVE-2011-0199"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"], "id": "5968.PRM", "href": "https://www.tenable.com/plugins/nnm/5968", "sourceData": "Binary data 5968.prm", "cvss": {"score": 10, "vector": "CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2017-12-20T13:18:42", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "Mandriva Update for mysql MDVSA-2010:155-1 (mysql)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-2008", "CVE-2010-3683", "CVE-2010-3677"], "modified": "2017-12-19T00:00:00", "id": "OPENVAS:831244", "href": "http://plugins.openvas.org/nasl.php?oid=831244", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for mysql MDVSA-2010:155-1 (mysql)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in mysql:\n\n MySQL before 5.1.48 allows remote authenticated users with alter\n database privileges to cause a denial of service (server crash\n and database loss) via an ALTER DATABASE command with a #mysql50#\n string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or\n similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which\n causes MySQL to move certain directories to the server data directory\n (CVE-2010-2008).\n \n Additionally many security issues noted in the 5.1.49 release notes\n has been addressed with this advisory as well, such as:\n \n * LOAD DATA INFILE did not check for SQL errors and sent an OK packet\n even when errors were already reported. Also, an assert related to\n client-server protocol checking in debug servers sometimes was raised\n when it should not have been. (Bug#52512) (CVE-2010-3683)\n \n * Using EXPLAIN with queries of the form SELECT ... UNION ... ORDER\n BY (SELECT ... WHERE ...) could cause a server crash. (Bug#52711)\n (CVE-2010-3682)\n \n * The server could crash if there were alternate reads from two indexes\n on a table using the HANDLER interface. (Bug#54007) (CVE-2010-3681)\n \n * A malformed argument to the BINLOG statement could result in Valgrind\n warnings or a server crash. (Bug#54393) (CVE-2010-3679)\n \n * Incorrect handling of NULL arguments could lead to a crash for IN()\n or CASE operations when NULL arguments were either passed explicitly\n as arguments (for IN()) or implicitly generated by the WITH ROLLUP\n modifier (for IN() and CASE). (Bug#54477) (CVE-2010-3678)\n \n * Joins involving a table with with a unique SET column could cause\n a server crash. (Bug#54575) (CVE-2010-3677)\n \n * Use of TEMPORARY InnoDB tables with nullable columns could cause\n a server crash. (Bug#54044) (CVE-2010-3680)\n \n The updated packages have been patched to correct these issues.\n \n Update:\n \n Packages for 2009.1 was not provided with the MDVSA-2010:155\n advisory. This advisory provides the missing packages.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"mysql on Mandriva Linux 2009.1,\n Mandriva Linux 2009.1/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-11/msg00007.php\");\n script_id(831244);\n script_version(\"$Revision: 8164 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-19 07:30:41 +0100 (Tue, 19 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:155-1\");\n script_cve_id(\"CVE-2010-2008\", \"CVE-2010-3683\", \"CVE-2010-3682\", \"CVE-2010-3681\", \"CVE-2010-3679\", \"CVE-2010-3678\", \"CVE-2010-3677\", \"CVE-2010-3680\");\n script_name(\"Mandriva Update for mysql MDVSA-2010:155-1 (mysql)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2009.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libmysql16\", rpm:\"libmysql16~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-devel\", rpm:\"libmysql-devel~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-static-devel\", rpm:\"libmysql-static-devel~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-client\", rpm:\"mysql-client~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common\", rpm:\"mysql-common~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-doc\", rpm:\"mysql-doc~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-max\", rpm:\"mysql-max~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-extra\", rpm:\"mysql-ndb-extra~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-management\", rpm:\"mysql-ndb-management~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-storage\", rpm:\"mysql-ndb-storage~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-tools\", rpm:\"mysql-ndb-tools~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql16\", rpm:\"lib64mysql16~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-devel\", rpm:\"lib64mysql-devel~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-static-devel\", rpm:\"lib64mysql-static-devel~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-01-17T11:05:56", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "Mandriva Update for mysql MDVSA-2010:155-1 (mysql)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-2008", "CVE-2010-3683", "CVE-2010-3677"], "modified": "2018-01-16T00:00:00", "id": "OPENVAS:1361412562310831244", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831244", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for mysql MDVSA-2010:155-1 (mysql)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in mysql:\n\n MySQL before 5.1.48 allows remote authenticated users with alter\n database privileges to cause a denial of service (server crash\n and database loss) via an ALTER DATABASE command with a #mysql50#\n string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or\n similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which\n causes MySQL to move certain directories to the server data directory\n (CVE-2010-2008).\n \n Additionally many security issues noted in the 5.1.49 release notes\n has been addressed with this advisory as well, such as:\n \n * LOAD DATA INFILE did not check for SQL errors and sent an OK packet\n even when errors were already reported. Also, an assert related to\n client-server protocol checking in debug servers sometimes was raised\n when it should not have been. (Bug#52512) (CVE-2010-3683)\n \n * Using EXPLAIN with queries of the form SELECT ... UNION ... ORDER\n BY (SELECT ... WHERE ...) could cause a server crash. (Bug#52711)\n (CVE-2010-3682)\n \n * The server could crash if there were alternate reads from two indexes\n on a table using the HANDLER interface. (Bug#54007) (CVE-2010-3681)\n \n * A malformed argument to the BINLOG statement could result in Valgrind\n warnings or a server crash. (Bug#54393) (CVE-2010-3679)\n \n * Incorrect handling of NULL arguments could lead to a crash for IN()\n or CASE operations when NULL arguments were either passed explicitly\n as arguments (for IN()) or implicitly generated by the WITH ROLLUP\n modifier (for IN() and CASE). (Bug#54477) (CVE-2010-3678)\n \n * Joins involving a table with with a unique SET column could cause\n a server crash. (Bug#54575) (CVE-2010-3677)\n \n * Use of TEMPORARY InnoDB tables with nullable columns could cause\n a server crash. (Bug#54044) (CVE-2010-3680)\n \n The updated packages have been patched to correct these issues.\n \n Update:\n \n Packages for 2009.1 was not provided with the MDVSA-2010:155\n advisory. This advisory provides the missing packages.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"mysql on Mandriva Linux 2009.1,\n Mandriva Linux 2009.1/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-11/msg00007.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831244\");\n script_version(\"$Revision: 8438 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-16 18:38:23 +0100 (Tue, 16 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:155-1\");\n script_cve_id(\"CVE-2010-2008\", \"CVE-2010-3683\", \"CVE-2010-3682\", \"CVE-2010-3681\", \"CVE-2010-3679\", \"CVE-2010-3678\", \"CVE-2010-3677\", \"CVE-2010-3680\");\n script_name(\"Mandriva Update for mysql MDVSA-2010:155-1 (mysql)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2009.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libmysql16\", rpm:\"libmysql16~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-devel\", rpm:\"libmysql-devel~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-static-devel\", rpm:\"libmysql-static-devel~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-client\", rpm:\"mysql-client~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common\", rpm:\"mysql-common~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-doc\", rpm:\"mysql-doc~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-max\", rpm:\"mysql-max~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-extra\", rpm:\"mysql-ndb-extra~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-management\", rpm:\"mysql-ndb-management~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-storage\", rpm:\"mysql-ndb-storage~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-tools\", rpm:\"mysql-ndb-tools~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql16\", rpm:\"lib64mysql16~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-devel\", rpm:\"lib64mysql-devel~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-static-devel\", rpm:\"lib64mysql-static-devel~5.1.42~0.6mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:55:57", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2011-01-21T00:00:00", "type": "openvas", "title": "Mandriva Update for mysql MDVSA-2011:012 (mysql)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-3676", "CVE-2010-3683", "CVE-2010-3677"], "modified": "2017-07-06T00:00:00", "id": "OPENVAS:831315", "href": "http://plugins.openvas.org/nasl.php?oid=831315", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for mysql MDVSA-2011:012 (mysql)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in mysql:\n\n storage/innobase/dict/dict0crea.c in mysqld in MySQL 5.1 before\n 5.1.49 allows remote authenticated users to cause a denial of service\n (assertion failure) by modifying the (1) innodb_file_format or (2)\n innodb_file_per_table configuration parameters for the InnoDB storage\n engine, then executing a DDL statement (CVE-2010-3676).\n \n MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote\n authenticated users to cause a denial of service (mysqld daemon\n crash) via a join query that uses a table with a unique SET column\n (CVE-2010-3677).\n \n MySQL 5.1 before 5.1.49 allows remote authenticated users to cause\n a denial of service (crash) via (1) IN or (2) CASE operations with\n NULL arguments that are explicitly specified or indirectly provided\n by the WITH ROLLUP modifier (CVE-2010-3678).\n \n MySQL 5.1 before 5.1.49 allows remote authenticated users to cause\n a denial of service (mysqld daemon crash) via certain arguments to\n the BINLOG command, which triggers an access of uninitialized memory,\n as demonstrated by valgrind (CVE-2010-3679).\n \n MySQL 5.1 before 5.1.49 allows remote authenticated users to cause\n a denial of service (mysqld daemon crash) by creating temporary\n tables while using InnoDB, which triggers an assertion failure\n (CVE-2010-3680).\n \n MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote\n authenticated users to cause a denial of service (mysqld daemon\n crash) by using the HANDLER interface and performing alternate reads\n from two indexes on a table, which triggers an assertion failure\n (CVE-2010-3681).\n \n MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote\n authenticated users to cause a denial of service (mysqld daemon crash)\n by using EXPLAIN with crafted &quot;SELECT ... UNION ... ORDER BY \\(SELECT\n ... WHERE ...\\)&quot; statements, which triggers a NULL pointer dereference\n in the Item_singlerow_subselect::store function (CVE-2010-3682).\n \n MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when\n a LOAD DATA INFILE request generates SQL errors, which allows remote\n authenticated users to cause a denial of service (mysqld daemon crash)\n via a crafted request (CVE-2010-3683).\n \n The updated packages have been upgraded to the latest (last) stable\n 5.1 release (5.1.54) to address these issues for both Mandriva Linux\n 2010.0 and 2010.2.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"mysql on Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64,\n Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2011-01/msg00014.php\");\n script_id(831315);\n script_version(\"$Revision: 6570 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:06:35 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-21 14:59:01 +0100 (Fri, 21 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_xref(name: \"MDVSA\", value: \"2011:012\");\n script_cve_id(\"CVE-2010-3676\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\");\n script_name(\"Mandriva Update for mysql MDVSA-2011:012 (mysql)\");\n\n script_summary(\"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libmysql16\", rpm:\"libmysql16~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-devel\", rpm:\"libmysql-devel~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-static-devel\", rpm:\"libmysql-static-devel~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-client\", rpm:\"mysql-client~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common\", rpm:\"mysql-common~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common-core\", rpm:\"mysql-common-core~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-core\", rpm:\"mysql-core~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-plugin_pbxt\", rpm:\"mysql-plugin_pbxt~1.0.11~13.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-plugin_pinba\", rpm:\"mysql-plugin_pinba~0.0.5~13.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-plugin_revision\", rpm:\"mysql-plugin_revision~0.1~13.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-plugin_sphinx\", rpm:\"mysql-plugin_sphinx~0.9.9~13.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql16\", rpm:\"lib64mysql16~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-devel\", rpm:\"lib64mysql-devel~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-static-devel\", rpm:\"lib64mysql-static-devel~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libmysql16\", rpm:\"libmysql16~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-devel\", rpm:\"libmysql-devel~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-static-devel\", rpm:\"libmysql-static-devel~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-client\", rpm:\"mysql-client~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common\", rpm:\"mysql-common~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common-core\", rpm:\"mysql-common-core~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-core\", rpm:\"mysql-core~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-doc\", rpm:\"mysql-doc~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-max\", rpm:\"mysql-max~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-extra\", rpm:\"mysql-ndb-extra~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-management\", rpm:\"mysql-ndb-management~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-storage\", rpm:\"mysql-ndb-storage~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-tools\", rpm:\"mysql-ndb-tools~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql16\", rpm:\"lib64mysql16~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-devel\", rpm:\"lib64mysql-devel~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-static-devel\", rpm:\"lib64mysql-static-devel~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:34", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-01-21T00:00:00", "type": "openvas", "title": "Mandriva Update for mysql MDVSA-2011:012 (mysql)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-3676", "CVE-2010-3683", "CVE-2010-3677"], "modified": "2019-03-12T00:00:00", "id": "OPENVAS:1361412562310831315", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831315", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for mysql MDVSA-2011:012 (mysql)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.mandriva.com/security-announce/2011-01/msg00014.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831315\");\n script_version(\"$Revision: 14114 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-12 12:48:52 +0100 (Tue, 12 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-21 14:59:01 +0100 (Fri, 21 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_xref(name:\"MDVSA\", value:\"2011:012\");\n script_cve_id(\"CVE-2010-3676\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\");\n script_name(\"Mandriva Update for mysql MDVSA-2011:012 (mysql)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'mysql'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\", re:\"ssh/login/release=MNDK_(2010\\.1|2010\\.0)\");\n script_tag(name:\"affected\", value:\"mysql on Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64,\n Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities has been found and corrected in mysql:\n\n storage/innobase/dict/dict0crea.c in mysqld in MySQL 5.1 before\n 5.1.49 allows remote authenticated users to cause a denial of service\n (assertion failure) by modifying the (1) innodb_file_format or (2)\n innodb_file_per_table configuration parameters for the InnoDB storage\n engine, then executing a DDL statement (CVE-2010-3676).\n\n MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote\n authenticated users to cause a denial of service (mysqld daemon\n crash) via a join query that uses a table with a unique SET column\n (CVE-2010-3677).\n\n MySQL 5.1 before 5.1.49 allows remote authenticated users to cause\n a denial of service (crash) via (1) IN or (2) CASE operations with\n NULL arguments that are explicitly specified or indirectly provided\n by the WITH ROLLUP modifier (CVE-2010-3678).\n\n MySQL 5.1 before 5.1.49 allows remote authenticated users to cause\n a denial of service (mysqld daemon crash) via certain arguments to\n the BINLOG command, which triggers an access of uninitialized memory,\n as demonstrated by valgrind (CVE-2010-3679).\n\n MySQL 5.1 before 5.1.49 allows remote authenticated users to cause\n a denial of service (mysqld daemon crash) by creating temporary\n tables while using InnoDB, which triggers an assertion failure\n (CVE-2010-3680).\n\n MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote\n authenticated users to cause a denial of service (mysqld daemon\n crash) by using the HANDLER interface and performing alternate reads\n from two indexes on a table, which triggers an assertion failure\n (CVE-2010-3681).\n\n MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote\n authenticated users to cause a denial of service (mysqld daemon crash)\n by using EXPLAIN with crafted 'SELECT ... UNION ... ORDER BY \\(SELECT\n ... WHERE ...\\)' statements, which triggers a NULL pointer dereference\n in the Item_singlerow_subselect::store function (CVE-2010-3682).\n\n MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when\n a LOAD DATA INFILE request generates SQL errors, which allows remote\n authenticated users to cause a denial of service (mysqld daemon crash)\n via a crafted request (CVE-2010-3683).\n\n The updated packages have been upgraded to the latest (last) stable\n 5.1 release (5.1.54) to address these issues for both Mandriva Linux\n 2010.0 and 2010.2.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libmysql16\", rpm:\"libmysql16~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-devel\", rpm:\"libmysql-devel~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-static-devel\", rpm:\"libmysql-static-devel~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-client\", rpm:\"mysql-client~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common\", rpm:\"mysql-common~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common-core\", rpm:\"mysql-common-core~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-core\", rpm:\"mysql-core~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-plugin_pbxt\", rpm:\"mysql-plugin_pbxt~1.0.11~13.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-plugin_pinba\", rpm:\"mysql-plugin_pinba~0.0.5~13.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-plugin_revision\", rpm:\"mysql-plugin_revision~0.1~13.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-plugin_sphinx\", rpm:\"mysql-plugin_sphinx~0.9.9~13.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql16\", rpm:\"lib64mysql16~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-devel\", rpm:\"lib64mysql-devel~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-static-devel\", rpm:\"lib64mysql-static-devel~5.1.54~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libmysql16\", rpm:\"libmysql16~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-devel\", rpm:\"libmysql-devel~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-static-devel\", rpm:\"libmysql-static-devel~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-client\", rpm:\"mysql-client~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common\", rpm:\"mysql-common~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common-core\", rpm:\"mysql-common-core~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-core\", rpm:\"mysql-core~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-doc\", rpm:\"mysql-doc~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-max\", rpm:\"mysql-max~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-extra\", rpm:\"mysql-ndb-extra~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-management\", rpm:\"mysql-ndb-management~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-storage\", rpm:\"mysql-ndb-storage~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-tools\", rpm:\"mysql-ndb-tools~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql16\", rpm:\"lib64mysql16~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-devel\", rpm:\"lib64mysql-devel~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-static-devel\", rpm:\"lib64mysql-static-devel~5.1.54~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2017-12-14T11:48:58", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-12-02T00:00:00", "type": "openvas", "title": "Fedora Update for mysql FEDORA-2010-15147", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-3676", "CVE-2010-3683", "CVE-2010-3677"], "modified": "2017-12-14T00:00:00", "id": "OPENVAS:862676", "href": "http://plugins.openvas.org/nasl.php?oid=862676", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mysql FEDORA-2010-15147\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"mysql on Fedora 14\";\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\n client/server implementation consisting of a server daemon (mysqld)\n and many different client programs and libraries. The base package\n contains the standard MySQL client programs and generic MySQL files.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048881.html\");\n script_id(862676);\n script_version(\"$Revision: 8109 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-14 07:31:15 +0100 (Thu, 14 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-02 08:39:14 +0100 (Thu, 02 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-15147\");\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3679\", \"CVE-2010-3678\", \"CVE-2010-3680\", \"CVE-2010-3682\", \"CVE-2010-3676\", \"CVE-2010-3681\", \"CVE-2010-3683\");\n script_name(\"Fedora Update for mysql FEDORA-2010-15147\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.50~2.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:54:51", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-12-02T00:00:00", "type": "openvas", "title": "Fedora Update for mysql FEDORA-2010-15147", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-3676", "CVE-2010-3683", "CVE-2010-3677"], "modified": "2017-12-29T00:00:00", "id": "OPENVAS:1361412562310862676", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862676", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mysql FEDORA-2010-15147\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"mysql on Fedora 14\";\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\n client/server implementation consisting of a server daemon (mysqld)\n and many different client programs and libraries. The base package\n contains the standard MySQL client programs and generic MySQL files.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048881.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862676\");\n script_version(\"$Revision: 8258 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-29 08:28:57 +0100 (Fri, 29 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-02 08:39:14 +0100 (Thu, 02 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-15147\");\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3679\", \"CVE-2010-3678\", \"CVE-2010-3680\", \"CVE-2010-3682\", \"CVE-2010-3676\", \"CVE-2010-3681\", \"CVE-2010-3683\");\n script_name(\"Fedora Update for mysql FEDORA-2010-15147\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.50~2.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-12-21T11:32:50", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-10-19T00:00:00", "type": "openvas", "title": "Fedora Update for mysql FEDORA-2010-15166", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-2008", "CVE-2010-3676", "CVE-2010-3683", "CVE-2010-3677", "CVE-2010-1850", "CVE-2010-1848", "CVE-2010-1849"], "modified": "2017-12-20T00:00:00", "id": "OPENVAS:1361412562310862444", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862444", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mysql FEDORA-2010-15166\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"mysql on Fedora 13\";\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\n client/server implementation consisting of a server daemon (mysqld)\n and many different client programs and libraries. The base package\n contains the standard MySQL client programs and generic MySQL files.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048788.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862444\");\n script_version(\"$Revision: 8187 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-20 08:30:09 +0100 (Wed, 20 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-10-19 15:54:15 +0200 (Tue, 19 Oct 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-15166\");\n script_cve_id(\"CVE-2010-2008\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2010-3677\", \"CVE-2010-3679\", \"CVE-2010-3678\", \"CVE-2010-3680\", \"CVE-2010-3682\", \"CVE-2010-3676\", \"CVE-2010-3681\", \"CVE-2010-3683\");\n script_name(\"Fedora Update for mysql FEDORA-2010-15166\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.50~2.fc13\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-12T11:10:59", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-10-19T00:00:00", "type": "openvas", "title": "Fedora Update for mysql FEDORA-2010-15166", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-2008", "CVE-2010-3676", "CVE-2010-3683", "CVE-2010-3677", "CVE-2010-1850", "CVE-2010-1848", "CVE-2010-1849"], "modified": "2017-12-11T00:00:00", "id": "OPENVAS:862444", "href": "http://plugins.openvas.org/nasl.php?oid=862444", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mysql FEDORA-2010-15166\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"mysql on Fedora 13\";\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\n client/server implementation consisting of a server daemon (mysqld)\n and many different client programs and libraries. The base package\n contains the standard MySQL client programs and generic MySQL files.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048788.html\");\n script_id(862444);\n script_version(\"$Revision: 8068 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-11 07:31:34 +0100 (Mon, 11 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-10-19 15:54:15 +0200 (Tue, 19 Oct 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-15166\");\n script_cve_id(\"CVE-2010-2008\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2010-3677\", \"CVE-2010-3679\", \"CVE-2010-3678\", \"CVE-2010-3680\", \"CVE-2010-3682\", \"CVE-2010-3676\", \"CVE-2010-3681\", \"CVE-2010-3683\");\n script_name(\"Fedora Update for mysql FEDORA-2010-15166\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.50~2.fc13\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2020-04-27T19:22:45", "description": "The host is running MySQL and is prone to multiple denial of service\n vulnerabilities.", "cvss3": {}, "published": "2011-01-18T00:00:00", "type": "openvas", "title": "MySQL Multiple Denial Of Service Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3676"], "modified": "2020-04-23T00:00:00", "id": "OPENVAS:1361412562310801566", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801566", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# MySQL Multiple Denial Of Service Vulnerabilities\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mysql:mysql\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801566\");\n script_version(\"2020-04-23T08:43:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-23 08:43:39 +0000 (Thu, 23 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2011-01-18 07:48:41 +0100 (Tue, 18 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n script_cve_id(\"CVE-2010-3676\", \"CVE-2010-3679\", \"CVE-2010-3678\", \"CVE-2010-3680\");\n script_name(\"MySQL Multiple Denial Of Service Vulnerabilities\");\n script_xref(name:\"URL\", value:\"http://bugs.mysql.com/bug.php?id=54477\");\n script_xref(name:\"URL\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628172\");\n script_xref(name:\"URL\", value:\"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html\");\n script_xref(name:\"URL\", value:\"http://www.openwall.com/lists/oss-security/2010/09/28/10\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2011 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"mysql_version.nasl\");\n script_require_ports(\"Services/mysql\", 3306);\n script_mandatory_keys(\"MySQL/installed\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation could allow users to cause a Denial of Service.\");\n\n script_tag(name:\"affected\", value:\"MySQL version 5.1 before 5.1.49 on all running platforms.\");\n\n script_tag(name:\"insight\", value:\"The flaws are due to:\n\n - An error in 'storage/innobase/dict/dict0crea.c' in 'mysqld' allows remote\n authenticated users to cause a denial of service by modifying the\n innodb_file_format or innodb_file_per_table configuration parameters for\n the InnoDB storage engine.\n\n - An error in handling of 'IN' or 'CASE' operations with NULL arguments that\n are explicitly specified or indirectly provided by the WITH ROLLUP modifier.\n\n - An error in handling of certain arguments to the BINLOG command, which\n triggers an access of uninitialized memory.\n\n - An error in creating temporary tables while using InnoDB, which triggers an\n assertion failure.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to MySQL version 5.1.49.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"summary\", value:\"The host is running MySQL and is prone to multiple denial of service\n vulnerabilities.\");\n\n exit(0);\n}\n\ninclude(\"misc_func.inc\");\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!sqlPort = get_app_port(cpe:CPE))\n exit(0);\n\nif(!mysqlVer = get_app_version(cpe:CPE, port:sqlPort))\n exit(0);\n\nmysqlVer = eregmatch(pattern:\"([0-9.a-z]+)\", string:mysqlVer);\nif(!isnull(mysqlVer[1]))\n{\n if(version_in_range(version:mysqlVer[1], test_version:\"5.1\",test_version2:\"5.1.48\")){\n report = report_fixed_ver(installed_version:mysqlVer[1], vulnerable_range:\"5.1 - 5.1.48\");\n security_message(port: 0, data: report);\n }\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2018-01-11T11:07:44", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2012-06-05T00:00:00", "type": "openvas", "title": "RedHat Update for mysql RHSA-2011:0164-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-3836", "CVE-2010-3683", "CVE-2010-3677", "CVE-2010-3838"], "modified": "2018-01-10T00:00:00", "id": "OPENVAS:870736", "href": "http://plugins.openvas.org/nasl.php?oid=870736", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for mysql RHSA-2011:0164-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. It consists of\n the MySQL server daemon (mysqld) and many client programs and libraries.\n\n The MySQL PolyFromWKB() function did not sanity check Well-Known Binary\n (WKB) data, which could allow a remote, authenticated attacker to crash\n mysqld. (CVE-2010-3840)\n\n A flaw in the way MySQL processed certain JOIN queries could allow a\n remote, authenticated attacker to cause excessive CPU use (up to 100%), if\n a stored procedure contained JOIN queries, and that procedure was executed\n twice in sequence. (CVE-2010-3839)\n\n A flaw in the way MySQL processed queries that provide a mixture of numeric\n and longblob data types to the LEAST or GREATEST function, could allow a\n remote, authenticated attacker to crash mysqld. (CVE-2010-3838)\n\n A flaw in the way MySQL processed PREPARE statements containing both\n GROUP_CONCAT and the WITH ROLLUP modifier could allow a remote,\n authenticated attacker to crash mysqld. (CVE-2010-3837)\n\n MySQL did not properly pre-evaluate LIKE arguments in view prepare mode,\n possibly allowing a remote, authenticated attacker to crash mysqld.\n (CVE-2010-3836)\n\n A flaw in the way MySQL processed statements that assign a value to a\n user-defined variable and that also contain a logical value evaluation\n could allow a remote, authenticated attacker to crash mysqld.\n (CVE-2010-3835)\n\n A flaw in the way MySQL evaluated the arguments of extreme-value functions,\n such as LEAST and GREATEST, could allow a remote, authenticated attacker to\n crash mysqld. (CVE-2010-3833)\n\n A flaw in the way MySQL handled LOAD DATA INFILE requests allowed MySQL to\n send OK packets even when there were errors. (CVE-2010-3683)\n\n A flaw in the way MySQL processed EXPLAIN statements for some complex\n SELECT queries could allow a remote, authenticated attacker to crash\n mysqld. (CVE-2010-3682)\n\n A flaw in the way MySQL processed certain alternating READ requests\n provided by HANDLER statements could allow a remote, authenticated attacker\n to crash mysqld. (CVE-2010-3681)\n\n A flaw in the way MySQL processed CREATE TEMPORARY TABLE statements that\n define NULL columns when using the InnoDB storage engine, could allow a\n remote, authenticated attacker to crash mysqld. (CVE-2010-3680)\n\n A flaw in the way MySQL processed certain values provided to the BINLOG\n statement caused MySQL to read unassigned memory. A remote, authenticated\n attacker could possibly use this flaw to crash mysq ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"mysql on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2011-January/msg00017.html\");\n script_id(870736);\n script_version(\"$Revision: 8352 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-10 08:01:57 +0100 (Wed, 10 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-05 19:32:48 +0530 (Tue, 05 Jun 2012)\");\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\",\n \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\",\n \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\",\n \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"RHSA\", value: \"2011:0164-01\");\n script_name(\"RedHat Update for mysql RHSA-2011:0164-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-debuginfo\", rpm:\"mysql-debuginfo~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-libs\", rpm:\"mysql-libs~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:34", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-06-05T00:00:00", "type": "openvas", "title": "RedHat Update for mysql RHSA-2011:0164-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-3836", "CVE-2010-3683", "CVE-2010-3677", "CVE-2010-3838"], "modified": "2018-11-23T00:00:00", "id": "OPENVAS:1361412562310870736", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870736", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for mysql RHSA-2011:0164-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2011-January/msg00017.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870736\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-05 19:32:48 +0530 (Tue, 05 Jun 2012)\");\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\",\n \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\",\n \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\",\n \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name:\"RHSA\", value:\"2011:0164-01\");\n script_name(\"RedHat Update for mysql RHSA-2011:0164-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'mysql'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n script_tag(name:\"affected\", value:\"mysql on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"MySQL is a multi-user, multi-threaded SQL database server. It consists of\n the MySQL server daemon (mysqld) and many client programs and libraries.\n\n The MySQL PolyFromWKB() function did not sanity check Well-Known Binary\n (WKB) data, which could allow a remote, authenticated attacker to crash\n mysqld. (CVE-2010-3840)\n\n A flaw in the way MySQL processed certain JOIN queries could allow a\n remote, authenticated attacker to cause excessive CPU use (up to 100%), if\n a stored procedure contained JOIN queries, and that procedure was executed\n twice in sequence. (CVE-2010-3839)\n\n A flaw in the way MySQL processed queries that provide a mixture of numeric\n and longblob data types to the LEAST or GREATEST function, could allow a\n remote, authenticated attacker to crash mysqld. (CVE-2010-3838)\n\n A flaw in the way MySQL processed PREPARE statements containing both\n GROUP_CONCAT and the WITH ROLLUP modifier could allow a remote,\n authenticated attacker to crash mysqld. (CVE-2010-3837)\n\n MySQL did not properly pre-evaluate LIKE arguments in view prepare mode,\n possibly allowing a remote, authenticated attacker to crash mysqld.\n (CVE-2010-3836)\n\n A flaw in the way MySQL processed statements that assign a value to a\n user-defined variable and that also contain a logical value evaluation\n could allow a remote, authenticated attacker to crash mysqld.\n (CVE-2010-3835)\n\n A flaw in the way MySQL evaluated the arguments of extreme-value functions,\n such as LEAST and GREATEST, could allow a remote, authenticated attacker to\n crash mysqld. (CVE-2010-3833)\n\n A flaw in the way MySQL handled LOAD DATA INFILE requests allowed MySQL to\n send OK packets even when there were errors. (CVE-2010-3683)\n\n A flaw in the way MySQL processed EXPLAIN statements for some complex\n SELECT queries could allow a remote, authenticated attacker to crash\n mysqld. (CVE-2010-3682)\n\n A flaw in the way MySQL processed certain alternating READ requests\n provided by HANDLER statements could allow a remote, authenticated attacker\n to crash mysqld. (CVE-2010-3681)\n\n A flaw in the way MySQL processed CREATE TEMPORARY TABLE statements that\n define NULL columns when using the InnoDB storage engine, could allow a\n remote, authenticated attacker to crash mysqld. (CVE-2010-3680)\n\n A flaw in the way MySQL processed certain values provided to the BINLOG\n statement caused MySQL to read unassigned memory. A remote, authenticated\n attacker could possibly use this flaw to crash mysq ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-debuginfo\", rpm:\"mysql-debuginfo~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-libs\", rpm:\"mysql-libs~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.1.52~1.el6_0.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:36:32", "description": "Oracle Linux Local Security Checks ELSA-2011-0164", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2011-0164", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-3836", "CVE-2010-3683", "CVE-2010-3677", "CVE-2010-3838"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310122267", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122267", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2011-0164.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122267\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:15:42 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2011-0164\");\n script_tag(name:\"insight\", value:\"ELSA-2011-0164 - mysql security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2011-0164\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2011-0164.html\");\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux6\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.52~1.el6_0.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.52~1.el6_0.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.1.52~1.el6_0.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-embedded\", rpm:\"mysql-embedded~5.1.52~1.el6_0.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-embedded-devel\", rpm:\"mysql-embedded-devel~5.1.52~1.el6_0.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-libs\", rpm:\"mysql-libs~5.1.52~1.el6_0.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.1.52~1.el6_0.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.1.52~1.el6_0.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2018-01-25T10:55:10", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1017-1", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "Ubuntu Update for MySQL vulnerabilities USN-1017-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-2008", "CVE-2010-3836", "CVE-2010-3683", "CVE-2010-3677", "CVE-2010-3834", "CVE-2010-3838"], "modified": "2018-01-24T00:00:00", "id": "OPENVAS:1361412562310840533", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840533", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1017_1.nasl 8510 2018-01-24 07:57:42Z teissa $\n#\n# Ubuntu Update for MySQL vulnerabilities USN-1017-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that MySQL incorrectly handled certain requests with the\n UPGRADE DATA DIRECTORY NAME command. An authenticated user could exploit\n this to make MySQL crash, causing a denial of service. This issue only\n affected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-2008)\n\n It was discovered that MySQL incorrectly handled joins involving a table\n with a unique SET column. An authenticated user could exploit this to make\n MySQL crash, causing a denial of service. This issue only affected Ubuntu\n 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3677)\n \n It was discovered that MySQL incorrectly handled NULL arguments to IN() or\n CASE operations. An authenticated user could exploit this to make MySQL\n crash, causing a denial of service. This issue only affected Ubuntu 9.10\n and 10.04 LTS. (CVE-2010-3678)\n \n It was discovered that MySQL incorrectly handled malformed arguments to the\n BINLOG statement. An authenticated user could exploit this to make MySQL\n crash, causing a denial of service. This issue only affected Ubuntu 9.10\n and 10.04 LTS. (CVE-2010-3679)\n \n It was discovered that MySQL incorrectly handled the use of TEMPORARY\n InnoDB tables with nullable columns. An authenticated user could exploit\n this to make MySQL crash, causing a denial of service. This issue only\n affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3680)\n \n It was discovered that MySQL incorrectly handled alternate reads from two\n indexes on a table using the HANDLER interface. An authenticated user could\n exploit this to make MySQL crash, causing a denial of service. This issue\n only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS.\n (CVE-2010-3681)\n \n It was discovered that MySQL incorrectly handled use of EXPLAIN with\n certain queries. An authenticated user could exploit this to make MySQL\n crash, causing a denial of service. This issue only affected Ubuntu\n 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3682)\n \n It was discovered that MySQL incorrectly handled error reporting when using\n LOAD DATA INFILE and would incorrectly raise an assert in certain\n circumstances. An authenticated user could exploit this to make MySQL\n crash, causing a denial of service. This issue only affected Ubuntu 9.10\n and 10.04 LTS. (CVE-2010-3683)\n \n It was discovered that MySQL incorrectly handled propagation during\n evaluation of arguments to extreme-value functions. An authenticated user\n could exploit this to make MySQL crash, causing a denial of service. This\n issue only affected Ubuntu 8.0 ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1017-1\";\ntag_affected = \"MySQL vulnerabilities on Ubuntu 6.06 LTS ,\n Ubuntu 8.04 LTS ,\n Ubuntu 9.10 ,\n Ubuntu 10.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1017-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840533\");\n script_version(\"$Revision: 8510 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-24 08:57:42 +0100 (Wed, 24 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"USN\", value: \"1017-1\");\n script_cve_id(\"CVE-2010-2008\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_name(\"Ubuntu Update for MySQL vulnerabilities USN-1017-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient-dev\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient16\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqld-dev\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqld-pic\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client-5.1\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.1\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-core-5.1\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient16-dev\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15-dev\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15off\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client-5.0\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.0\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient-dev\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient16\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqld-dev\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqld-pic\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client-5.1\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client-core-5.1\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.1\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-core-5.1\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-testsuite\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient16-dev\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15-dev\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15off\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client-5.0\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.0\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-12-04T11:17:58", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1017-1", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "Ubuntu Update for MySQL vulnerabilities USN-1017-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-2008", "CVE-2010-3836", "CVE-2010-3683", "CVE-2010-3677", "CVE-2010-3834", "CVE-2010-3838"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:840533", "href": "http://plugins.openvas.org/nasl.php?oid=840533", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1017_1.nasl 7965 2017-12-01 07:38:25Z santu $\n#\n# Ubuntu Update for MySQL vulnerabilities USN-1017-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that MySQL incorrectly handled certain requests with the\n UPGRADE DATA DIRECTORY NAME command. An authenticated user could exploit\n this to make MySQL crash, causing a denial of service. This issue only\n affected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-2008)\n\n It was discovered that MySQL incorrectly handled joins involving a table\n with a unique SET column. An authenticated user could exploit this to make\n MySQL crash, causing a denial of service. This issue only affected Ubuntu\n 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3677)\n \n It was discovered that MySQL incorrectly handled NULL arguments to IN() or\n CASE operations. An authenticated user could exploit this to make MySQL\n crash, causing a denial of service. This issue only affected Ubuntu 9.10\n and 10.04 LTS. (CVE-2010-3678)\n \n It was discovered that MySQL incorrectly handled malformed arguments to the\n BINLOG statement. An authenticated user could exploit this to make MySQL\n crash, causing a denial of service. This issue only affected Ubuntu 9.10\n and 10.04 LTS. (CVE-2010-3679)\n \n It was discovered that MySQL incorrectly handled the use of TEMPORARY\n InnoDB tables with nullable columns. An authenticated user could exploit\n this to make MySQL crash, causing a denial of service. This issue only\n affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3680)\n \n It was discovered that MySQL incorrectly handled alternate reads from two\n indexes on a table using the HANDLER interface. An authenticated user could\n exploit this to make MySQL crash, causing a denial of service. This issue\n only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS.\n (CVE-2010-3681)\n \n It was discovered that MySQL incorrectly handled use of EXPLAIN with\n certain queries. An authenticated user could exploit this to make MySQL\n crash, causing a denial of service. This issue only affected Ubuntu\n 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3682)\n \n It was discovered that MySQL incorrectly handled error reporting when using\n LOAD DATA INFILE and would incorrectly raise an assert in certain\n circumstances. An authenticated user could exploit this to make MySQL\n crash, causing a denial of service. This issue only affected Ubuntu 9.10\n and 10.04 LTS. (CVE-2010-3683)\n \n It was discovered that MySQL incorrectly handled propagation during\n evaluation of arguments to extreme-value functions. An authenticated user\n could exploit this to make MySQL crash, causing a denial of service. This\n issue only affected Ubuntu 8.0 ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1017-1\";\ntag_affected = \"MySQL vulnerabilities on Ubuntu 6.06 LTS ,\n Ubuntu 8.04 LTS ,\n Ubuntu 9.10 ,\n Ubuntu 10.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1017-1/\");\n script_id(840533);\n script_version(\"$Revision: 7965 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:38:25 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"USN\", value: \"1017-1\");\n script_cve_id(\"CVE-2010-2008\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_name(\"Ubuntu Update for MySQL vulnerabilities USN-1017-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient-dev\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient16\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqld-dev\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqld-pic\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client-5.1\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.1\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-core-5.1\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient16-dev\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.1.37-1ubuntu5.5\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15-dev\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15off\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client-5.0\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.0\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.0.22-0ubuntu6.06.15\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient-dev\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient16\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqld-dev\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqld-pic\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client-5.1\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client-core-5.1\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.1\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-core-5.1\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-testsuite\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient16-dev\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.1.41-3ubuntu12.7\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15-dev\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libmysqlclient15off\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client-5.0\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.0\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-client\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-common\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mysql-server\", ver:\"5.0.51a-3ubuntu5.8\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:40:02", "description": "The host is running MySQL and is prone to multiple denial of service\n vulnerabilities.", "cvss3": {}, "published": "2011-01-18T00:00:00", "type": "openvas", "title": "MySQL Handler Multiple Denial Of Service Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3681", "CVE-2010-3683"], "modified": "2019-05-13T00:00:00", "id": "OPENVAS:1361412562310801568", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801568", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# MySQL Handler Multiple Denial Of Service Vulnerabilities\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mysql:mysql\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801568\");\n script_version(\"2019-05-13T14:05:09+0000\");\n script_tag(name:\"last_modification\", value:\"2019-05-13 14:05:09 +0000 (Mon, 13 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2011-01-18 07:48:41 +0100 (Tue, 18 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n script_cve_id(\"CVE-2010-3681\", \"CVE-2010-3683\");\n script_name(\"MySQL Handler Multiple Denial Of Service Vulnerabilities\");\n script_xref(name:\"URL\", value:\"http://bugs.mysql.com/bug.php?id=54477\");\n script_xref(name:\"URL\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628172\");\n script_xref(name:\"URL\", value:\"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html\");\n script_xref(name:\"URL\", value:\"http://www.openwall.com/lists/oss-security/2010/09/28/10\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2011 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"mysql_version.nasl\");\n script_require_ports(\"Services/mysql\", 3306);\n script_mandatory_keys(\"MySQL/installed\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation could allow users to cause a Denial of Service.\");\n\n script_tag(name:\"affected\", value:\"MySQL version 5.1 before 5.1.49 and 5.5 before 5.5.5 on all running platforms.\");\n\n script_tag(name:\"insight\", value:\"The flaws are due to:\n\n - An error in handling of HANDLER interface and performing alternate reads\n from two indexes on a table, which triggers an assertion failure.\n\n - An error in handling of 'OK' packet when a 'LOAD DATA INFILE' request\n generates SQL errors.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to MySQL version 5.1.49 or 5.5.5.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"summary\", value:\"The host is running MySQL and is prone to multiple denial of service\n vulnerabilities.\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!sqlPort = get_app_port(cpe:CPE))\n exit(0);\n\nif(!mysqlVer = get_app_version(cpe:CPE, port:sqlPort))\n exit(0);\n\nmysqlVer = eregmatch(pattern:\"([0-9.a-z]+)\", string:mysqlVer);\nif(!isnull(mysqlVer[1]))\n{\n if(version_in_range(version:mysqlVer[1], test_version:\"5.5\",test_version2:\"5.5.4\")||\n version_in_range(version:mysqlVer[1], test_version:\"5.1\",test_version2:\"5.1.48\")){\n security_message(sqlPort);\n }\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:39:28", "description": "The host is running MySQL and is prone to multiple denial of service\n vulnerabilities.", "cvss3": {}, "published": "2011-01-18T00:00:00", "type": "openvas", "title": "MySQL Mysqld Multiple Denial Of Service Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3682", "CVE-2010-3677"], "modified": "2018-10-20T00:00:00", "id": "OPENVAS:1361412562310801567", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801567", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mysql_mysqld_mult_dos_vuln.nasl 11997 2018-10-20 11:59:41Z mmartin $\n#\n# MySQL Mysqld Multiple Denial Of Service Vulnerabilities\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mysql:mysql\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801567\");\n script_version(\"$Revision: 11997 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-20 13:59:41 +0200 (Sat, 20 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-18 07:48:41 +0100 (Tue, 18 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3682\");\n script_name(\"MySQL Mysqld Multiple Denial Of Service Vulnerabilities\");\n script_xref(name:\"URL\", value:\"http://bugs.mysql.com/bug.php?id=54477\");\n script_xref(name:\"URL\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=628172\");\n script_xref(name:\"URL\", value:\"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html\");\n script_xref(name:\"URL\", value:\"http://www.openwall.com/lists/oss-security/2010/09/28/10\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2011 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_dependencies(\"mysql_version.nasl\");\n script_require_ports(\"Services/mysql\", 3306);\n script_mandatory_keys(\"MySQL/installed\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation could allow users to cause a Denial of Service\n condution.\");\n script_tag(name:\"affected\", value:\"MySQL version 5.1 before 5.1.49 and 5.0 before 5.0.92 on all running platform.\");\n script_tag(name:\"insight\", value:\"The flaws are due to:\n\n - An error in handling of a join query that uses a table with a unique\n SET column.\n\n - An error in handling of 'EXPLAIN' with crafted\n 'SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)' statements.\");\n script_tag(name:\"solution\", value:\"Upgrade to MySQL version 5.1.49 or 5.0.92\");\n script_tag(name:\"summary\", value:\"The host is running MySQL and is prone to multiple denial of service\n vulnerabilities.\");\n\n script_xref(name:\"URL\", value:\"http://dev.mysql.com/downloads\");\n exit(0);\n}\n\ninclude(\"misc_func.inc\");\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nsqlPort = get_app_port(cpe:CPE);\nif(!sqlPort){\n exit(0);\n}\n\nmysqlVer = get_app_version(cpe:CPE, port:sqlPort);\nif(isnull(mysqlVer)){\n exit(0);\n}\n\nmysqlVer = eregmatch(pattern:\"([0-9.a-z]+)\", string:mysqlVer);\nif(!isnull(mysqlVer[1]))\n{\n if(version_in_range(version:mysqlVer[1], test_version:\"5.0\",test_version2:\"5.0.91\")||\n version_in_range(version:mysqlVer[1], test_version:\"5.1\",test_version2:\"5.1.48\")){\n security_message(port:sqlPort);\n }\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2017-12-20T13:17:46", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "RedHat Update for mysql RHSA-2010:0825-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3836", "CVE-2010-3677", "CVE-2010-3838"], "modified": "2017-12-19T00:00:00", "id": "OPENVAS:870356", "href": "http://plugins.openvas.org/nasl.php?oid=870356", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for mysql RHSA-2010:0825-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. It consists of\n the MySQL server daemon (mysqld) and many client programs and libraries.\n\n It was found that the MySQL PolyFromWKB() function did not sanity check\n Well-Known Binary (WKB) data. A remote, authenticated attacker could use\n specially-crafted WKB data to crash mysqld. This issue only caused a\n temporary denial of service, as mysqld was automatically restarted after\n the crash. (CVE-2010-3840)\n \n A flaw was found in the way MySQL processed certain JOIN queries. If a\n stored procedure contained JOIN queries, and that procedure was executed\n twice in sequence, it could cause an infinite loop, leading to excessive\n CPU use (up to 100%). A remote, authenticated attacker could use this flaw\n to cause a denial of service. (CVE-2010-3839)\n \n A flaw was found in the way MySQL processed queries that provide a mixture\n of numeric and longblob data types to the LEAST or GREATEST function. A\n remote, authenticated attacker could use this flaw to crash mysqld. This\n issue only caused a temporary denial of service, as mysqld was\n automatically restarted after the crash. (CVE-2010-3838)\n \n A flaw was found in the way MySQL processed PREPARE statements containing\n both GROUP_CONCAT and the WITH ROLLUP modifier. A remote, authenticated\n attacker could use this flaw to crash mysqld. This issue only caused a\n temporary denial of service, as mysqld was automatically restarted after\n the crash. (CVE-2010-3837)\n \n It was found that MySQL did not properly pre-evaluate LIKE arguments in\n view prepare mode. A remote, authenticated attacker could possibly use this\n flaw to crash mysqld. (CVE-2010-3836)\n \n A flaw was found in the way MySQL processed statements that assign a value\n to a user-defined variable and that also contain a logical value\n evaluation. A remote, authenticated attacker could use this flaw to crash\n mysqld. This issue only caused a temporary denial of service, as mysqld was\n automatically restarted after the crash. (CVE-2010-3835)\n \n A flaw was found in the way MySQL evaluated the arguments of extreme-value\n functions, such as LEAST and GREATEST. A remote, authenticated attacker\n could use this flaw to crash mysqld. This issue only caused a temporary\n denial of service, as mysqld was automatically restarted after the crash.\n (CVE-2010-3833)\n \n A flaw was found in the way MySQL processed EXPLAIN statements for some\n complex SELECT queries. A remote, authenticated attacker could use this\n flaw to crash mysqld. This issue only caused a temporary denial of servic ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"mysql on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-November/msg00003.html\");\n script_id(870356);\n script_version(\"$Revision: 8164 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-19 07:30:41 +0100 (Tue, 19 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"RHSA\", value: \"2010:0825-01\");\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_name(\"RedHat Update for mysql RHSA-2010:0825-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.0.77~4.el5_5.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.0.77~4.el5_5.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-debuginfo\", rpm:\"mysql-debuginfo~5.0.77~4.el5_5.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.0.77~4.el5_5.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.0.77~4.el5_5.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.0.77~4.el5_5.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-01-11T11:04:12", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "RedHat Update for mysql RHSA-2010:0825-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3836", "CVE-2010-3677", "CVE-2010-3838"], "modified": "2018-01-10T00:00:00", "id": "OPENVAS:1361412562310870356", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870356", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for mysql RHSA-2010:0825-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. It consists of\n the MySQL server daemon (mysqld) and many client programs and libraries.\n\n It was found that the MySQL PolyFromWKB() function did not sanity check\n Well-Known Binary (WKB) data. A remote, authenticated attacker could use\n specially-crafted WKB data to crash mysqld. This issue only caused a\n temporary denial of service, as mysqld was automatically restarted after\n the crash. (CVE-2010-3840)\n \n A flaw was found in the way MySQL processed certain JOIN queries. If a\n stored procedure contained JOIN queries, and that procedure was executed\n twice in sequence, it could cause an infinite loop, leading to excessive\n CPU use (up to 100%). A remote, authenticated attacker could use this flaw\n to cause a denial of service. (CVE-2010-3839)\n \n A flaw was found in the way MySQL processed queries that provide a mixture\n of numeric and longblob data types to the LEAST or GREATEST function. A\n remote, authenticated attacker could use this flaw to crash mysqld. This\n issue only caused a temporary denial of service, as mysqld was\n automatically restarted after the crash. (CVE-2010-3838)\n \n A flaw was found in the way MySQL processed PREPARE statements containing\n both GROUP_CONCAT and the WITH ROLLUP modifier. A remote, authenticated\n attacker could use this flaw to crash mysqld. This issue only caused a\n temporary denial of service, as mysqld was automatically restarted after\n the crash. (CVE-2010-3837)\n \n It was found that MySQL did not properly pre-evaluate LIKE arguments in\n view prepare mode. A remote, authenticated attacker could possibly use this\n flaw to crash mysqld. (CVE-2010-3836)\n \n A flaw was found in the way MySQL processed statements that assign a value\n to a user-defined variable and that also contain a logical value\n evaluation. A remote, authenticated attacker could use this flaw to crash\n mysqld. This issue only caused a temporary denial of service, as mysqld was\n automatically restarted after the crash. (CVE-2010-3835)\n \n A flaw was found in the way MySQL evaluated the arguments of extreme-value\n functions, such as LEAST and GREATEST. A remote, authenticated attacker\n could use this flaw to crash mysqld. This issue only caused a temporary\n denial of service, as mysqld was automatically restarted after the crash.\n (CVE-2010-3833)\n \n A flaw was found in the way MySQL processed EXPLAIN statements for some\n complex SELECT queries. A remote, authenticated attacker could use this\n flaw to crash mysqld. This issue only caused a temporary denial of servic ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"mysql on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-November/msg00003.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870356\");\n script_version(\"$Revision: 8356 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-10 09:00:39 +0100 (Wed, 10 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"RHSA\", value: \"2010:0825-01\");\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_name(\"RedHat Update for mysql RHSA-2010:0825-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.0.77~4.el5_5.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.0.77~4.el5_5.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-debuginfo\", rpm:\"mysql-debuginfo~5.0.77~4.el5_5.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.0.77~4.el5_5.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.0.77~4.el5_5.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.0.77~4.el5_5.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:36:51", "description": "Oracle Linux Local Security Checks ELSA-2010-0825", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2010-0825", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3836", "CVE-2010-3677", "CVE-2010-3838"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310122299", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122299", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2010-0825.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122299\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:16:15 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2010-0825\");\n script_tag(name:\"insight\", value:\"ELSA-2010-0825 - mysql security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2010-0825\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2010-0825.html\");\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3839\", \"CVE-2010-3840\", \"CVE-2010-3838\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.0.77~4.el5_5.4\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.0.77~4.el5_5.4\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~5.0.77~4.el5_5.4\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~5.0.77~4.el5_5.4\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mysql-test\", rpm:\"mysql-test~5.0.77~4.el5_5.4\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-12-15T11:57:47", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "Mandriva Update for mysql MDVSA-2010:222 (mysql)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3836", "CVE-2010-3677", "CVE-2010-3834", "CVE-2010-3838"], "modified": "2017-12-15T00:00:00", "id": "OPENVAS:831243", "href": "http://plugins.openvas.org/nasl.php?oid=831243", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for mysql MDVSA-2010:222 (mysql)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were discovered and corrected in mysql:\n\n * Joins involving a table with with a unique SET column could cause\n a server crash (CVE-2010-3677).\n \n * Use of TEMPORARY InnoDB tables with nullable columns could cause\n a server crash (CVE-2010-3680).\n \n * The server could crash if there were alternate reads from two\n indexes on a table using the HANDLER interface (CVE-2010-3681).\n \n * Using EXPLAIN with queries of the form SELECT ... UNION ... ORDER BY\n (SELECT ... WHERE ...) could cause a server crash (CVE-2010-3682).\n \n * During evaluation of arguments to extreme-value functions (such\n as LEAST() and GREATEST()), type errors did not propagate properly,\n causing the server to crash (CVE-2010-3833).\n \n * The server could crash after materializing a derived table that\n required a temporary table for grouping (CVE-2010-3834).\n \n * A user-variable assignment expression that is evaluated in a logical\n expression context can be precalculated in a temporary table for GROUP\n BY. However, when the expression value is used after creation of the\n temporary table, it was re-evaluated, not read from the table and a\n server crash resulted (CVE-2010-3835).\n \n * Pre-evaluation of LIKE predicates during view preparation could\n cause a server crash (CVE-2010-3836).\n \n * GROUP_CONCAT() and WITH ROLLUP together could cause a server crash\n (CVE-2010-3837).\n \n * Queries could cause a server crash if the GREATEST() or LEAST()\n function had a mixed list of numeric and LONGBLOB arguments, and\n the result of such a function was processed using an intermediate\n temporary table (CVE-2010-3838).\n \n * Queries with nested joins could cause an infinite loop in the\n server when used from stored procedures and prepared statements\n (CVE-2010-3839).\n \n * The PolyFromWKB() function could crash the server when improper\n WKB data was passed to the function (CVE-2010-3840).\n \n Additionally the default behaviour of using the mysqlmanager instead\n of the mysqld_safe script has been reverted in the SysV init script\n because of instability issues with the mysqlmanager.\n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. Please visit this link to learn more:\n http://store.mandriva.com/product_info.php?cPath=149&products_id=490\n \n The updated packages have been upgraded to mysql 5.0.91 and patched\n to correct these issues.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"mysql on Mandriva Linux 2009.0,\n Mandriva Linux 2009.0/X86_64,\n Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-11/msg00008.php\");\n script_id(831243);\n script_version(\"$Revision: 8130 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-15 07:31:09 +0100 (Fri, 15 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:222\");\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_name(\"Mandriva Update for mysql MDVSA-2010:222 (mysql)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"libmysql15\", rpm:\"libmysql15~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-devel\", rpm:\"libmysql-devel~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-static-devel\", rpm:\"libmysql-static-devel~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-client\", rpm:\"mysql-client~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common\", rpm:\"mysql-common~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-doc\", rpm:\"mysql-doc~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-max\", rpm:\"mysql-max~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-extra\", rpm:\"mysql-ndb-extra~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-management\", rpm:\"mysql-ndb-management~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-storage\", rpm:\"mysql-ndb-storage~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-tools\", rpm:\"mysql-ndb-tools~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15\", rpm:\"lib64mysql15~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-devel\", rpm:\"lib64mysql-devel~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-static-devel\", rpm:\"lib64mysql-static-devel~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libmysql15\", rpm:\"libmysql15~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-devel\", rpm:\"libmysql-devel~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-static-devel\", rpm:\"libmysql-static-devel~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-client\", rpm:\"mysql-client~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common\", rpm:\"mysql-common~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-doc\", rpm:\"mysql-doc~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-max\", rpm:\"mysql-max~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-extra\", rpm:\"mysql-ndb-extra~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-management\", rpm:\"mysql-ndb-management~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-storage\", rpm:\"mysql-ndb-storage~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-tools\", rpm:\"mysql-ndb-tools~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15\", rpm:\"lib64mysql15~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-devel\", rpm:\"lib64mysql-devel~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-static-devel\", rpm:\"lib64mysql-static-devel~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-01-06T13:04:50", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "Mandriva Update for mysql MDVSA-2010:222 (mysql)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3836", "CVE-2010-3677", "CVE-2010-3834", "CVE-2010-3838"], "modified": "2018-01-04T00:00:00", "id": "OPENVAS:1361412562310831243", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831243", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for mysql MDVSA-2010:222 (mysql)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were discovered and corrected in mysql:\n\n * Joins involving a table with with a unique SET column could cause\n a server crash (CVE-2010-3677).\n \n * Use of TEMPORARY InnoDB tables with nullable columns could cause\n a server crash (CVE-2010-3680).\n \n * The server could crash if there were alternate reads from two\n indexes on a table using the HANDLER interface (CVE-2010-3681).\n \n * Using EXPLAIN with queries of the form SELECT ... UNION ... ORDER BY\n (SELECT ... WHERE ...) could cause a server crash (CVE-2010-3682).\n \n * During evaluation of arguments to extreme-value functions (such\n as LEAST() and GREATEST()), type errors did not propagate properly,\n causing the server to crash (CVE-2010-3833).\n \n * The server could crash after materializing a derived table that\n required a temporary table for grouping (CVE-2010-3834).\n \n * A user-variable assignment expression that is evaluated in a logical\n expression context can be precalculated in a temporary table for GROUP\n BY. However, when the expression value is used after creation of the\n temporary table, it was re-evaluated, not read from the table and a\n server crash resulted (CVE-2010-3835).\n \n * Pre-evaluation of LIKE predicates during view preparation could\n cause a server crash (CVE-2010-3836).\n \n * GROUP_CONCAT() and WITH ROLLUP together could cause a server crash\n (CVE-2010-3837).\n \n * Queries could cause a server crash if the GREATEST() or LEAST()\n function had a mixed list of numeric and LONGBLOB arguments, and\n the result of such a function was processed using an intermediate\n temporary table (CVE-2010-3838).\n \n * Queries with nested joins could cause an infinite loop in the\n server when used from stored procedures and prepared statements\n (CVE-2010-3839).\n \n * The PolyFromWKB() function could crash the server when improper\n WKB data was passed to the function (CVE-2010-3840).\n \n Additionally the default behaviour of using the mysqlmanager instead\n of the mysqld_safe script has been reverted in the SysV init script\n because of instability issues with the mysqlmanager.\n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. Please visit this link to learn more:\n http://store.mandriva.com/product_info.php?cPath=149&products_id=490\n \n The updated packages have been upgraded to mysql 5.0.91 and patched\n to correct these issues.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"mysql on Mandriva Linux 2009.0,\n Mandriva Linux 2009.0/X86_64,\n Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-11/msg00008.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831243\");\n script_version(\"$Revision: 8287 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-04 08:28:11 +0100 (Thu, 04 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:222\");\n script_cve_id(\"CVE-2010-3677\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_name(\"Mandriva Update for mysql MDVSA-2010:222 (mysql)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"libmysql15\", rpm:\"libmysql15~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-devel\", rpm:\"libmysql-devel~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-static-devel\", rpm:\"libmysql-static-devel~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-client\", rpm:\"mysql-client~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common\", rpm:\"mysql-common~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-doc\", rpm:\"mysql-doc~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-max\", rpm:\"mysql-max~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-extra\", rpm:\"mysql-ndb-extra~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-management\", rpm:\"mysql-ndb-management~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-storage\", rpm:\"mysql-ndb-storage~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-tools\", rpm:\"mysql-ndb-tools~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15\", rpm:\"lib64mysql15~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-devel\", rpm:\"lib64mysql-devel~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-static-devel\", rpm:\"lib64mysql-static-devel~5.0.91~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libmysql15\", rpm:\"libmysql15~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-devel\", rpm:\"libmysql-devel~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-static-devel\", rpm:\"libmysql-static-devel~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-client\", rpm:\"mysql-client~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common\", rpm:\"mysql-common~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-doc\", rpm:\"mysql-doc~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-max\", rpm:\"mysql-max~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-extra\", rpm:\"mysql-ndb-extra~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-management\", rpm:\"mysql-ndb-management~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-storage\", rpm:\"mysql-ndb-storage~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-tools\", rpm:\"mysql-ndb-tools~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql15\", rpm:\"lib64mysql15~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-devel\", rpm:\"lib64mysql-devel~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-static-devel\", rpm:\"lib64mysql-static-devel~5.0.91~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:00", "description": "The remote host is missing updates announced in\nadvisory GLSA 201201-02.", "cvss3": {}, "published": "2012-02-12T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201201-02 (MySQL)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2446", "CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3678", "CVE-2008-4456", "CVE-2010-3839", "CVE-2010-3835", "CVE-2008-4097", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-1621", "CVE-2009-4028", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-1626", "CVE-2008-4098", "CVE-2010-2008", "CVE-2010-3676", "CVE-2010-3836", "CVE-2010-3683", "CVE-2010-3677", "CVE-2008-3963", "CVE-2010-1850", "CVE-2010-3834", "CVE-2010-3838", "CVE-2010-1848", "CVE-2008-7247", "CVE-2010-1849", "CVE-2009-4019", "CVE-2009-4484"], "modified": "2018-10-12T00:00:00", "id": "OPENVAS:136141256231070803", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231070803", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa_201201_02.nasl 11859 2018-10-12 08:53:01Z cfischer $\n#\n# Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.70803\");\n script_tag(name:\"cvss_base\", value:\"8.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-3963\", \"CVE-2008-4097\", \"CVE-2008-4098\", \"CVE-2008-4456\", \"CVE-2008-7247\", \"CVE-2009-2446\", \"CVE-2009-4019\", \"CVE-2009-4028\", \"CVE-2009-4484\", \"CVE-2010-1621\", \"CVE-2010-1626\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2010-2008\", \"CVE-2010-3676\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_version(\"$Revision: 11859 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 10:53:01 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-12 10:04:41 -0500 (Sun, 12 Feb 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201201-02 (MySQL)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities were found in MySQL, some of which may\n allow execution of arbitrary code.\");\n script_tag(name:\"solution\", value:\"All MySQL users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-db/mysql-5.1.56'\n\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are\n available since May 14, 2011. It is likely that your system is\nalready no\n longer affected by this issue.\");\n\n script_xref(name:\"URL\", value:\"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201201-02\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=220813\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=229329\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=237166\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=238117\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=240407\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=277717\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=294187\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=303747\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=319489\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=321791\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=339717\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=344987\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=351413\");\n script_tag(name:\"summary\", value:\"The remote host is missing updates announced in\nadvisory GLSA 201201-02.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"pkg-lib-gentoo.inc\");\ninclude(\"revisions-lib.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"dev-db/mysql\", unaffected: make_list(\"ge 5.1.56\"), vulnerable: make_list(\"lt 5.1.56\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2017-07-24T12:50:37", "description": "The remote host is missing updates announced in\nadvisory GLSA 201201-02.", "cvss3": {}, "published": "2012-02-12T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201201-02 (MySQL)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2446", "CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3678", "CVE-2008-4456", "CVE-2010-3839", "CVE-2010-3835", "CVE-2008-4097", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-1621", "CVE-2009-4028", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-1626", "CVE-2008-4098", "CVE-2010-2008", "CVE-2010-3676", "CVE-2010-3836", "CVE-2010-3683", "CVE-2010-3677", "CVE-2008-3963", "CVE-2010-1850", "CVE-2010-3834", "CVE-2010-3838", "CVE-2010-1848", "CVE-2008-7247", "CVE-2010-1849", "CVE-2009-4019", "CVE-2009-4484"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:70803", "href": "http://plugins.openvas.org/nasl.php?oid=70803", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were found in MySQL, some of which may\n allow execution of arbitrary code.\";\ntag_solution = \"All MySQL users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-db/mysql-5.1.56'\n \n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are\n available since May 14, 2011. It is likely that your system is\nalready no\n longer affected by this issue.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20201201-02\nhttp://bugs.gentoo.org/show_bug.cgi?id=220813\nhttp://bugs.gentoo.org/show_bug.cgi?id=229329\nhttp://bugs.gentoo.org/show_bug.cgi?id=237166\nhttp://bugs.gentoo.org/show_bug.cgi?id=238117\nhttp://bugs.gentoo.org/show_bug.cgi?id=240407\nhttp://bugs.gentoo.org/show_bug.cgi?id=277717\nhttp://bugs.gentoo.org/show_bug.cgi?id=294187\nhttp://bugs.gentoo.org/show_bug.cgi?id=303747\nhttp://bugs.gentoo.org/show_bug.cgi?id=319489\nhttp://bugs.gentoo.org/show_bug.cgi?id=321791\nhttp://bugs.gentoo.org/show_bug.cgi?id=339717\nhttp://bugs.gentoo.org/show_bug.cgi?id=344987\nhttp://bugs.gentoo.org/show_bug.cgi?id=351413\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 201201-02.\";\n\n \n \nif(description)\n{\n script_id(70803);\n script_tag(name:\"cvss_base\", value:\"8.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-3963\", \"CVE-2008-4097\", \"CVE-2008-4098\", \"CVE-2008-4456\", \"CVE-2008-7247\", \"CVE-2009-2446\", \"CVE-2009-4019\", \"CVE-2009-4028\", \"CVE-2009-4484\", \"CVE-2010-1621\", \"CVE-2010-1626\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2010-2008\", \"CVE-2010-3676\", \"CVE-2010-3677\", \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\", \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2010-3839\", \"CVE-2010-3840\");\n script_version(\"$Revision: 6593 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:18:14 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-12 10:04:41 -0500 (Sun, 12 Feb 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201201-02 (MySQL)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"dev-db/mysql\", unaffected: make_list(\"ge 5.1.56\"), vulnerable: make_list(\"lt 5.1.56\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-07-17T14:31:35", "description": "MySQL is prone to a denial-of-service vulnerability.", "cvss3": {}, "published": "2010-08-30T00:00:00", "type": "openvas", "title": "Oracle MySQL 'TEMPORARY InnoDB' Tables Denial Of Service Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3680"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310100763", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310100763", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Oracle MySQL 'TEMPORARY InnoDB' Tables Denial Of Service Vulnerability\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mysql:mysql\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.100763\");\n script_version(\"2019-07-05T09:54:18+0000\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 09:54:18 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2010-08-30 14:30:07 +0200 (Mon, 30 Aug 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_cve_id(\"CVE-2010-3680\");\n script_bugtraq_id(42598);\n script_name(\"Oracle MySQL 'TEMPORARY InnoDB' Tables Denial Of Service Vulnerability\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Databases\");\n script_copyright(\"This script is Copyright (C) 2010 Greenbone Networks GmbH\");\n script_dependencies(\"mysql_version.nasl\");\n script_require_ports(\"Services/mysql\", 3306);\n script_mandatory_keys(\"MySQL/installed\");\n\n script_xref(name:\"URL\", value:\"https://www.securityfocus.com/bid/42598\");\n script_xref(name:\"URL\", value:\"http://bugs.mysql.com/bug.php?id=54044\");\n script_xref(name:\"URL\", value:\"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html\");\n\n script_tag(name:\"summary\", value:\"MySQL is prone to a denial-of-service vulnerability.\");\n\n script_tag(name:\"impact\", value:\"An attacker can exploit these issues to crash the database, denying\n access to legitimate users.\");\n\n script_tag(name:\"affected\", value:\"This issues affect versions prior to MySQL 5.1.49.\");\n\n script_tag(name:\"solution\", value:\"Updates are available. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!port = get_app_port(cpe:CPE)) exit(0);\nif(!ver = get_app_version(cpe:CPE, port:port)) exit(0);\n\nif(ver =~ \"^5\\.\" && version_is_less(version:ver, test_version:\"5.1.49\")) {\n report = report_fixed_ver(installed_version:ver, fixed_version:\"5.1.49\");\n security_message(port:port, data:report);\n exit(0);\n}\n\nexit(99);", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2019-07-17T14:31:34", "description": "MySQL is prone to a denial-of-service vulnerability.", "cvss3": {}, "published": "2010-09-07T00:00:00", "type": "openvas", "title": "Oracle MySQL Prior to 5.1.49 Multiple Denial Of Service Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3677"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310100785", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310100785", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Oracle MySQL Prior to 5.1.49 Multiple Denial Of Service Vulnerabilities\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mysql:mysql\";\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.100785\");\n script_version(\"2019-07-05T09:54:18+0000\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 09:54:18 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2010-09-07 15:26:31 +0200 (Tue, 07 Sep 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_cve_id(\"CVE-2010-3677\");\n script_bugtraq_id(42646, 42633, 42643, 42598, 42596, 42638, 42599, 42625);\n\n script_name(\"Oracle MySQL Prior to 5.1.49 Multiple Denial Of Service Vulnerabilities\");\n\n script_xref(name:\"URL\", value:\"https://www.securityfocus.com/bid/42646\");\n script_xref(name:\"URL\", value:\"https://www.securityfocus.com/bid/42633\");\n script_xref(name:\"URL\", value:\"https://www.securityfocus.com/bid/42643\");\n script_xref(name:\"URL\", value:\"https://www.securityfocus.com/bid/42598\");\n script_xref(name:\"URL\", value:\"https://www.securityfocus.com/bid/42596\");\n script_xref(name:\"URL\", value:\"https://www.securityfocus.com/bid/42638\");\n script_xref(name:\"URL\", value:\"https://www.securityfocus.com/bid/42599\");\n script_xref(name:\"URL\", value:\"https://www.securityfocus.com/bid/42625\");\n script_xref(name:\"URL\", value:\"http://bugs.mysql.com/bug.php?id=54575\");\n script_xref(name:\"URL\", value:\"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n script_copyright(\"This script is Copyright (C) 2010 Greenbone Networks GmbH\");\n script_dependencies(\"mysql_version.nasl\");\n script_require_ports(\"Services/mysql\", 3306);\n script_mandatory_keys(\"MySQL/installed\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"solution\", value:\"Updates are available. Please see the references for more information.\");\n\n script_tag(name:\"summary\", value:\"MySQL is prone to a denial-of-service vulnerability.\");\n\n script_tag(name:\"impact\", value:\"An attacker can exploit this issue to crash the database, denying\n access to legitimate users.\");\n\n script_tag(name:\"affected\", value:\"This issue affects versions prior to MySQL 5.1.49.\");\n\n exit(0);\n}\n\ninclude(\"misc_func.inc\");\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!sqlPort = get_app_port(cpe:CPE))\n exit(0);\n\nif(!mysqlVer = get_app_version(cpe:CPE, port:sqlPort))\n exit(0);\n\nmysqlVer = eregmatch(pattern:\"([0-9.a-z]+)\", string:mysqlVer);\n\nif(!isnull(mysqlVer[1]) && mysqlVer[1] =~ \"^5\\.\")\n{\n if(version_is_less(version:mysqlVer[1], test_version:\"5.1.49\")){\n security_message(port:sqlPort);\n }\n}\n\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:38:37", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1397-1", "cvss3": {}, "published": "2012-03-16T00:00:00", "type": "openvas", "title": "Ubuntu Update for mysql-5.1 USN-1397-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-0075", "CVE-2009-2446", "CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3678", "CVE-2008-4456", "CVE-2010-3839", "CVE-2009-4030", "CVE-2010-3835", "CVE-2012-0112", "CVE-2010-3681", "CVE-2010-3833", "CVE-2012-0113", "CVE-2007-5925", "CVE-2010-3840", "CVE-2012-0115", "CVE-2010-1621", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-1626", "CVE-2008-4098", "CVE-2010-2008", "CVE-2012-0101", "CVE-2010-3836", "CVE-2010-3683", "CVE-2010-3677", "CVE-2008-3963", "CVE-2010-1850", "CVE-2012-0114", "CVE-2010-3834", "CVE-2010-3838", "CVE-2012-0116", "CVE-2010-1848", "CVE-2008-7247", "CVE-2012-0087", "CVE-2010-1849", "CVE-2009-4019", "CVE-2011-2262", "CVE-2009-4484", "CVE-2012-0102"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310840944", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840944", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1397_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for mysql-5.1 USN-1397-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1397-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840944\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-03-16 10:51:25 +0530 (Fri, 16 Mar 2012)\");\n script_cve_id(\"CVE-2007-5925\", \"CVE-2008-3963\", \"CVE-2008-4098\", \"CVE-2008-4456\",\n \"CVE-2008-7247\", \"CVE-2009-2446\", \"CVE-2009-4019\", \"CVE-2009-4030\",\n \"CVE-2009-4484\", \"CVE-2010-1621\", \"CVE-2010-1626\", \"CVE-2010-1848\",\n \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2010-2008\", \"CVE-2010-3677\",\n \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\",\n \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3834\",\n \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\",\n \"CVE-2010-3839\", \"CVE-2010-3840\", \"CVE-2011-2262\", \"CVE-2012-0075\",\n \"CVE-2012-0087\", \"CVE-2012-0101\", \"CVE-2012-0102\", \"CVE-2012-0112\",\n \"CVE-2012-0113\", \"CVE-2012-0114\", \"CVE-2012-0115\", \"CVE-2012-0116\");\n script_tag(name:\"cvss_base\", value:\"8.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:C/I:C/A:C\");\n script_xref(name:\"USN\", value:\"1397-1\");\n script_name(\"Ubuntu Update for mysql-5.1 USN-1397-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(10\\.10|10\\.04 LTS|11\\.10|11\\.04|8\\.04 LTS)\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1397-1\");\n script_tag(name:\"affected\", value:\"mysql-5.1 on Ubuntu 11.10,\n Ubuntu 11.04,\n Ubuntu 10.10,\n Ubuntu 10.04 LTS,\n Ubuntu 8.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Multiple security issues were discovered in MySQL and this update includes\n new upstream MySQL versions to fix these issues.\n\n MySQL has been updated to 5.1.61 in Ubuntu 10.04 LTS, Ubuntu 10.10,\n Ubuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS has been updated to\n MySQL 5.0.95.\n\n In addition to security fixes, the updated packages contain bug fixes, new\n features, and possibly incompatible changes.\n\n Please see the references for more information.\");\n\n script_xref(name:\"URL\", value:\"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html\");\n script_xref(name:\"URL\", value:\"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html\");\n script_xref(name:\"URL\", value:\"http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.1\", ver:\"5.1.61-0ubuntu0.10.10.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.1\", ver:\"5.1.61-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.1\", ver:\"5.1.61-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.1\", ver:\"5.1.61-0ubuntu0.11.04.1\", rls:\"UBUNTU11.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.0\", ver:\"5.0.95-0ubuntu1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2017-12-04T11:20:38", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1397-1", "cvss3": {}, "published": "2012-03-16T00:00:00", "type": "openvas", "title": "Ubuntu Update for mysql-5.1 USN-1397-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-0075", "CVE-2009-2446", "CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3678", "CVE-2008-4456", "CVE-2010-3839", "CVE-2009-4030", "CVE-2010-3835", "CVE-2012-0112", "CVE-2010-3681", "CVE-2010-3833", "CVE-2012-0113", "CVE-2007-5925", "CVE-2010-3840", "CVE-2012-0115", "CVE-2010-1621", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-1626", "CVE-2008-4098", "CVE-2010-2008", "CVE-2012-0101", "CVE-2010-3836", "CVE-2010-3683", "CVE-2010-3677", "CVE-2008-3963", "CVE-2010-1850", "CVE-2012-0114", "CVE-2010-3834", "CVE-2010-3838", "CVE-2012-0116", "CVE-2010-1848", "CVE-2008-7247", "CVE-2012-0087", "CVE-2010-1849", "CVE-2009-4019", "CVE-2011-2262", "CVE-2009-4484", "CVE-2012-0102"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:840944", "href": "http://plugins.openvas.org/nasl.php?oid=840944", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1397_1.nasl 7960 2017-12-01 06:58:16Z santu $\n#\n# Ubuntu Update for mysql-5.1 USN-1397-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple security issues were discovered in MySQL and this update includes\n new upstream MySQL versions to fix these issues.\n\n MySQL has been updated to 5.1.61 in Ubuntu 10.04 LTS, Ubuntu 10.10,\n Ubuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS has been updated to\n MySQL 5.0.95.\n\n In addition to security fixes, the updated packages contain bug fixes, new\n features, and possibly incompatible changes.\n\n Please see the following for more information:\n http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html\n http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html\n http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1397-1\";\ntag_affected = \"mysql-5.1 on Ubuntu 11.10 ,\n Ubuntu 11.04 ,\n Ubuntu 10.10 ,\n Ubuntu 10.04 LTS ,\n Ubuntu 8.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1397-1/\");\n script_id(840944);\n script_version(\"$Revision: 7960 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:58:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-03-16 10:51:25 +0530 (Fri, 16 Mar 2012)\");\n script_cve_id(\"CVE-2007-5925\", \"CVE-2008-3963\", \"CVE-2008-4098\", \"CVE-2008-4456\",\n \"CVE-2008-7247\", \"CVE-2009-2446\", \"CVE-2009-4019\", \"CVE-2009-4030\",\n \"CVE-2009-4484\", \"CVE-2010-1621\", \"CVE-2010-1626\", \"CVE-2010-1848\",\n \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2010-2008\", \"CVE-2010-3677\",\n \"CVE-2010-3678\", \"CVE-2010-3679\", \"CVE-2010-3680\", \"CVE-2010-3681\",\n \"CVE-2010-3682\", \"CVE-2010-3683\", \"CVE-2010-3833\", \"CVE-2010-3834\",\n \"CVE-2010-3835\", \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\",\n \"CVE-2010-3839\", \"CVE-2010-3840\", \"CVE-2011-2262\", \"CVE-2012-0075\",\n \"CVE-2012-0087\", \"CVE-2012-0101\", \"CVE-2012-0102\", \"CVE-2012-0112\",\n \"CVE-2012-0113\", \"CVE-2012-0114\", \"CVE-2012-0115\", \"CVE-2012-0116\");\n script_tag(name:\"cvss_base\", value:\"8.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"1397-1\");\n script_name(\"Ubuntu Update for mysql-5.1 USN-1397-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.1\", ver:\"5.1.61-0ubuntu0.10.10.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.1\", ver:\"5.1.61-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.1\", ver:\"5.1.61-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.1\", ver:\"5.1.61-0ubuntu0.11.04.1\", rls:\"UBUNTU11.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.0\", ver:\"5.0.95-0ubuntu1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-08T12:53:52", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "CentOS Update for mysql CESA-2010:0824 centos4 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3681", "CVE-2010-3840", "CVE-2010-1848"], "modified": "2018-01-05T00:00:00", "id": "OPENVAS:1361412562310880452", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880452", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for mysql CESA-2010:0824 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. It consists of\n the MySQL server daemon (mysqld) and many client programs and libraries.\n\n It was found that the MySQL PolyFromWKB() function did not sanity check\n Well-Known Binary (WKB) data. A remote, authenticated attacker could use\n specially-crafted WKB data to crash mysqld. This issue only caused a\n temporary denial of service, as mysqld was automatically restarted after\n the crash. (CVE-2010-3840)\n \n A flaw was found in the way MySQL processed certain alternating READ\n requests provided by HANDLER statements. A remote, authenticated attacker\n could use this flaw to provide such requests, causing mysqld to crash. This\n issue only caused a temporary denial of service, as mysqld was\n automatically restarted after the crash. (CVE-2010-3681)\n \n A directory traversal flaw was found in the way MySQL handled the\n parameters of the MySQL COM_FIELD_LIST network protocol command. A remote,\n authenticated attacker could use this flaw to obtain descriptions of the\n fields of an arbitrary table using a request with a specially-crafted\n table name. (CVE-2010-1848)\n \n All MySQL users are advised to upgrade to these updated packages, which\n contain backported patches to correct these issues. After installing this\n update, the MySQL server daemon (mysqld) will be restarted automatically.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"mysql on CentOS 4\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2010-November/017142.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880452\");\n script_version(\"$Revision: 8296 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-05 08:28:01 +0100 (Fri, 05 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2010:0824\");\n script_cve_id(\"CVE-2010-1848\", \"CVE-2010-3681\", \"CVE-2010-3840\");\n script_name(\"CentOS Update for mysql CESA-2010:0824 centos4 i386\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~4.1.22~2.el4_8.4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~4.1.22~2.el4_8.4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~4.1.22~2.el4_8.4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~4.1.22~2.el4_8.4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-14T11:48:49", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "RedHat Update for mysql RHSA-2010:0824-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3681", "CVE-2010-3840", "CVE-2010-1848"], "modified": "2017-12-14T00:00:00", "id": "OPENVAS:870357", "href": "http://plugins.openvas.org/nasl.php?oid=870357", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for mysql RHSA-2010:0824-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. It consists of\n the MySQL server daemon (mysqld) and many client programs and libraries.\n\n It was found that the MySQL PolyFromWKB() function did not sanity check\n Well-Known Binary (WKB) data. A remote, authenticated attacker could use\n specially-crafted WKB data to crash mysqld. This issue only caused a\n temporary denial of service, as mysqld was automatically restarted after\n the crash. (CVE-2010-3840)\n \n A flaw was found in the way MySQL processed certain alternating READ\n requests provided by HANDLER statements. A remote, authenticated attacker\n could use this flaw to provide such requests, causing mysqld to crash. This\n issue only caused a temporary denial of service, as mysqld was\n automatically restarted after the crash. (CVE-2010-3681)\n \n A directory traversal flaw was found in the way MySQL handled the\n parameters of the MySQL COM_FIELD_LIST network protocol command. A remote,\n authenticated attacker could use this flaw to obtain descriptions of the\n fields of an arbitrary table using a request with a specially-crafted\n table name. (CVE-2010-1848)\n \n All MySQL users are advised to upgrade to these updated packages, which\n contain backported patches to correct these issues. After installing this\n update, the MySQL server daemon (mysqld) will be restarted automatically.\";\n\ntag_affected = \"mysql on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-November/msg00002.html\");\n script_id(870357);\n script_version(\"$Revision: 8109 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-14 07:31:15 +0100 (Thu, 14 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_xref(name: \"RHSA\", value: \"2010:0824-01\");\n script_cve_id(\"CVE-2010-1848\", \"CVE-2010-3681\", \"CVE-2010-3840\");\n script_name(\"RedHat Update for mysql RHSA-2010:0824-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~4.1.22~2.el4_8.4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~4.1.22~2.el4_8.4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-debuginfo\", rpm:\"mysql-debuginfo~4.1.22~2.el4_8.4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~4.1.22~2.el4_8.4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~4.1.22~2.el4_8.4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:54:38", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "RedHat Update for mysql RHSA-2010:0824-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3681", "CVE-2010-3840", "CVE-2010-1848"], "modified": "2018-01-01T00:00:00", "id": "OPENVAS:1361412562310870357", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870357", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for mysql RHSA-2010:0824-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. It consists of\n the MySQL server daemon (mysqld) and many client programs and libraries.\n\n It was found that the MySQL PolyFromWKB() function did not sanity check\n Well-Known Binary (WKB) data. A remote, authenticated attacker could use\n specially-crafted WKB data to crash mysqld. This issue only caused a\n temporary denial of service, as mysqld was automatically restarted after\n the crash. (CVE-2010-3840)\n \n A flaw was found in the way MySQL processed certain alternating READ\n requests provided by HANDLER statements. A remote, authenticated attacker\n could use this flaw to provide such requests, causing mysqld to crash. This\n issue only caused a temporary denial of service, as mysqld was\n automatically restarted after the crash. (CVE-2010-3681)\n \n A directory traversal flaw was found in the way MySQL handled the\n parameters of the MySQL COM_FIELD_LIST network protocol command. A remote,\n authenticated attacker could use this flaw to obtain descriptions of the\n fields of an arbitrary table using a request with a specially-crafted\n table name. (CVE-2010-1848)\n \n All MySQL users are advised to upgrade to these updated packages, which\n contain backported patches to correct these issues. After installing this\n update, the MySQL server daemon (mysqld) will be restarted automatically.\";\n\ntag_affected = \"mysql on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-November/msg00002.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870357\");\n script_version(\"$Revision: 8266 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-01 08:28:32 +0100 (Mon, 01 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_xref(name: \"RHSA\", value: \"2010:0824-01\");\n script_cve_id(\"CVE-2010-1848\", \"CVE-2010-3681\", \"CVE-2010-3840\");\n script_name(\"RedHat Update for mysql RHSA-2010:0824-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~4.1.22~2.el4_8.4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~4.1.22~2.el4_8.4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-debuginfo\", rpm:\"mysql-debuginfo~4.1.22~2.el4_8.4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~4.1.22~2.el4_8.4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~4.1.22~2.el4_8.4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-18T10:58:00", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "CentOS Update for mysql CESA-2010:0824 centos4 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3681", "CVE-2010-3840", "CVE-2010-1848"], "modified": "2017-12-18T00:00:00", "id": "OPENVAS:880452", "href": "http://plugins.openvas.org/nasl.php?oid=880452", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for mysql CESA-2010:0824 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. It consists of\n the MySQL server daemon (mysqld) and many client programs and libraries.\n\n It was found that the MySQL PolyFromWKB() function did not sanity check\n Well-Known Binary (WKB) data. A remote, authenticated attacker could use\n specially-crafted WKB data to crash mysqld. This issue only caused a\n temporary denial of service, as mysqld was automatically restarted after\n the crash. (CVE-2010-3840)\n \n A flaw was found in the way MySQL processed certain alternating READ\n requests provided by HANDLER statements. A remote, authenticated attacker\n could use this flaw to provide such requests, causing mysqld to crash. This\n issue only caused a temporary denial of service, as mysqld was\n automatically restarted after the crash. (CVE-2010-3681)\n \n A directory traversal flaw was found in the way MySQL handled the\n parameters of the MySQL COM_FIELD_LIST network protocol command. A remote,\n authenticated attacker could use this flaw to obtain descriptions of the\n fields of an arbitrary table using a request with a specially-crafted\n table name. (CVE-2010-1848)\n \n All MySQL users are advised to upgrade to these updated packages, which\n contain backported patches to correct these issues. After installing this\n update, the MySQL server daemon (mysqld) will be restarted automatically.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"mysql on CentOS 4\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2010-November/017142.html\");\n script_id(880452);\n script_version(\"$Revision: 8153 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-18 07:30:39 +0100 (Mon, 18 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2010:0824\");\n script_cve_id(\"CVE-2010-1848\", \"CVE-2010-3681\", \"CVE-2010-3840\");\n script_name(\"CentOS Update for mysql CESA-2010:0824 centos4 i386\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~4.1.22~2.el4_8.4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~4.1.22~2.el4_8.4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-devel\", rpm:\"mysql-devel~4.1.22~2.el4_8.4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-server\", rpm:\"mysql-server~4.1.22~2.el4_8.4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2020-04-27T19:23:09", "description": "The host is running MySQL and is prone to Denial Of Service\n vulnerability.", "cvss3": {}, "published": "2010-07-19T00:00:00", "type": "openvas", "title": "MySQL 'ALTER DATABASE' Remote Denial Of Service Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008"], "modified": "2020-04-23T00:00:00", "id": "OPENVAS:1361412562310801380", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801380", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# MySQL 'ALTER DATABASE' Remote Denial Of Service Vulnerability\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mysql:mysql\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801380\");\n script_version(\"2020-04-23T12:22:09+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-23 12:22:09 +0000 (Thu, 23 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2010-07-19 10:09:06 +0200 (Mon, 19 Jul 2010)\");\n script_cve_id(\"CVE-2010-2008\");\n script_bugtraq_id(41198);\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_name(\"MySQL 'ALTER DATABASE' Remote Denial Of Service Vulnerability\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/40333\");\n script_xref(name:\"URL\", value:\"http://bugs.mysql.com/bug.php?id=53804\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/alerts/2010/Jun/1024160.html\");\n script_xref(name:\"URL\", value:\"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-48.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 Greenbone Networks GmbH\");\n script_family(\"Databases\");\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n script_dependencies(\"mysql_version.nasl\");\n script_require_ports(\"Services/mysql\", 3306);\n script_mandatory_keys(\"MySQL/installed\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation could allow an attacker to cause a Denial of Service.\");\n\n script_tag(name:\"affected\", value:\"MySQL version priot to 5.1.48 on all running platform.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to MySQL version 5.1.48.\");\n\n script_tag(name:\"summary\", value:\"The host is running MySQL and is prone to Denial Of Service\n vulnerability.\");\n\n script_tag(name:\"insight\", value:\"The flaw is due to an error when processing the 'ALTER DATABASE' statement and\n can be exploited to corrupt the MySQL data directory using the '#mysql50#'\n prefix followed by a '.' or '..'.\n\n NOTE: Successful exploitation requires 'ALTER' privileges on a database.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"misc_func.inc\");\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!sqlPort = get_app_port(cpe:CPE))\n exit(0);\n\nif(!mysqlVer = get_app_version(cpe:CPE, port:sqlPort))\n exit(0);\n\nmysqlVer = eregmatch(pattern:\"([0-9.a-z]+)\", string:mysqlVer);\nif(!isnull(mysqlVer[1]))\n{\n if(version_is_less(version:mysqlVer[1], test_version:\"5.1.48\")){\n report = report_fixed_ver(installed_version:mysqlVer[1], fixed_version:\"5.1.48\");\n security_message(port:sqlPort, data:report);\n }\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2018-01-22T13:05:42", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-08-24T00:00:00", "type": "openvas", "title": "Mandriva Update for mysql MDVSA-2010:155 (mysql)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008"], "modified": "2018-01-22T00:00:00", "id": "OPENVAS:1361412562310831134", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831134", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for mysql MDVSA-2010:155 (mysql)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in mysql:\n\n MySQL before 5.1.48 allows remote authenticated users with alter\n database privileges to cause a denial of service (server crash\n and database loss) via an ALTER DATABASE command with a mysql50\n string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or\n similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which\n causes MySQL to move certain directories to the server data directory\n (CVE-2010-2008).\n\n Additionally many security issues noted in the 5.1.49 release notes\n has been addressed with this advisory as well, such as:\n\n * LOAD DATA INFILE did not check for SQL errors and sent an OK packet\n even when errors were already reported. Also, an assert related to\n client-server protocol checking in debug servers sometimes was raised\n when it should not have been. (Bug#52512)\n\n * Using EXPLAIN with queries of the form SELECT ... UNION ... ORDER BY\n (SELECT ... WHERE ...) could cause a server crash. (Bug#52711)\n\n * The server could crash if there were alternate reads from two\n indexes on a table using the HANDLER interface. (Bug#54007)\n\n * A malformed argument to the BINLOG statement could result in Valgrind\n warnings or a server crash. (Bug#54393)\n\n * Incorrect handling of NULL arguments could lead to a crash for IN()\n or CASE operations when NULL arguments were either passed explicitly\n as arguments (for IN()) or implicitly generated by the WITH ROLLUP\n modifier (for IN() and CASE). (Bug#54477)\n\n * Joins involving a table with with a unique SET column could cause\n a server crash. (Bug#54575)\n\n * Use of TEMPORARY InnoDB tables with nullable columns could cause\n a server crash. (Bug#54044)\n\n The updated packages have been patched to correct these issues.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"mysql on Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-08/msg00014.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831134\");\n script_version(\"$Revision: 8485 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-22 08:57:57 +0100 (Mon, 22 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-08-24 07:04:19 +0200 (Tue, 24 Aug 2010)\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:155\");\n script_cve_id(\"CVE-2010-2008\");\n script_name(\"Mandriva Update for mysql MDVSA-2010:155 (mysql)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libmysql16\", rpm:\"libmysql16~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-devel\", rpm:\"libmysql-devel~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-static-devel\", rpm:\"libmysql-static-devel~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-client\", rpm:\"mysql-client~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common\", rpm:\"mysql-common~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common-core\", rpm:\"mysql-common-core~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-core\", rpm:\"mysql-core~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-doc\", rpm:\"mysql-doc~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-max\", rpm:\"mysql-max~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-extra\", rpm:\"mysql-ndb-extra~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-management\", rpm:\"mysql-ndb-management~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-storage\", rpm:\"mysql-ndb-storage~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-tools\", rpm:\"mysql-ndb-tools~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql16\", rpm:\"lib64mysql16~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-devel\", rpm:\"lib64mysql-devel~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-static-devel\", rpm:\"lib64mysql-static-devel~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 3.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:54:17", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-08-24T00:00:00", "type": "openvas", "title": "Mandriva Update for mysql MDVSA-2010:155 (mysql)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008"], "modified": "2017-12-22T00:00:00", "id": "OPENVAS:831134", "href": "http://plugins.openvas.org/nasl.php?oid=831134", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for mysql MDVSA-2010:155 (mysql)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in mysql:\n\n MySQL before 5.1.48 allows remote authenticated users with alter\n database privileges to cause a denial of service (server crash\n and database loss) via an ALTER DATABASE command with a mysql50\n string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or\n similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which\n causes MySQL to move certain directories to the server data directory\n (CVE-2010-2008).\n\n Additionally many security issues noted in the 5.1.49 release notes\n has been addressed with this advisory as well, such as:\n\n * LOAD DATA INFILE did not check for SQL errors and sent an OK packet\n even when errors were already reported. Also, an assert related to\n client-server protocol checking in debug servers sometimes was raised\n when it should not have been. (Bug#52512)\n\n * Using EXPLAIN with queries of the form SELECT ... UNION ... ORDER BY\n (SELECT ... WHERE ...) could cause a server crash. (Bug#52711)\n\n * The server could crash if there were alternate reads from two\n indexes on a table using the HANDLER interface. (Bug#54007)\n\n * A malformed argument to the BINLOG statement could result in Valgrind\n warnings or a server crash. (Bug#54393)\n\n * Incorrect handling of NULL arguments could lead to a crash for IN()\n or CASE operations when NULL arguments were either passed explicitly\n as arguments (for IN()) or implicitly generated by the WITH ROLLUP\n modifier (for IN() and CASE). (Bug#54477)\n\n * Joins involving a table with with a unique SET column could cause\n a server crash. (Bug#54575)\n\n * Use of TEMPORARY InnoDB tables with nullable columns could cause\n a server crash. (Bug#54044)\n\n The updated packages have been patched to correct these issues.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"mysql on Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-08/msg00014.php\");\n script_id(831134);\n script_version(\"$Revision: 8226 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-22 07:30:26 +0100 (Fri, 22 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-08-24 07:04:19 +0200 (Tue, 24 Aug 2010)\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:N/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:155\");\n script_cve_id(\"CVE-2010-2008\");\n script_name(\"Mandriva Update for mysql MDVSA-2010:155 (mysql)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libmysql16\", rpm:\"libmysql16~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-devel\", rpm:\"libmysql-devel~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libmysql-static-devel\", rpm:\"libmysql-static-devel~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-bench\", rpm:\"mysql-bench~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-client\", rpm:\"mysql-client~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common\", rpm:\"mysql-common~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-common-core\", rpm:\"mysql-common-core~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-core\", rpm:\"mysql-core~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-doc\", rpm:\"mysql-doc~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-max\", rpm:\"mysql-max~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-extra\", rpm:\"mysql-ndb-extra~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-management\", rpm:\"mysql-ndb-management~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-storage\", rpm:\"mysql-ndb-storage~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mysql-ndb-tools\", rpm:\"mysql-ndb-tools~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql16\", rpm:\"lib64mysql16~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-devel\", rpm:\"lib64mysql-devel~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64mysql-static-devel\", rpm:\"lib64mysql-static-devel~5.1.42~0.6mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 3.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:54:51", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-07-30T00:00:00", "type": "openvas", "title": "Fedora Update for mysql FEDORA-2010-11135", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008", "CVE-2010-1850", "CVE-2010-1848", "CVE-2010-1849"], "modified": "2017-12-25T00:00:00", "id": "OPENVAS:862290", "href": "http://plugins.openvas.org/nasl.php?oid=862290", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mysql FEDORA-2010-11135\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"mysql on Fedora 13\";\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\n client/server implementation consisting of a server daemon (mysqld)\n and many different client programs and libraries. The base package\n contains the standard MySQL client programs and generic MySQL files.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044546.html\");\n script_id(862290);\n script_version(\"$Revision: 8243 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-25 07:30:04 +0100 (Mon, 25 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-07-30 15:25:34 +0200 (Fri, 30 Jul 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-11135\");\n script_cve_id(\"CVE-2010-2008\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\");\n script_name(\"Fedora Update for mysql FEDORA-2010-11135\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.48~2.fc13\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-23T13:05:58", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-07-30T00:00:00", "type": "openvas", "title": "Fedora Update for mysql FEDORA-2010-11135", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008", "CVE-2010-1850", "CVE-2010-1848", "CVE-2010-1849"], "modified": "2018-01-23T00:00:00", "id": "OPENVAS:1361412562310862290", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862290", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mysql FEDORA-2010-11135\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"mysql on Fedora 13\";\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\n client/server implementation consisting of a server daemon (mysqld)\n and many different client programs and libraries. The base package\n contains the standard MySQL client programs and generic MySQL files.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044546.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862290\");\n script_version(\"$Revision: 8495 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-23 08:57:49 +0100 (Tue, 23 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-07-30 15:25:34 +0200 (Fri, 30 Jul 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-11135\");\n script_cve_id(\"CVE-2010-2008\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\");\n script_name(\"Fedora Update for mysql FEDORA-2010-11135\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.48~2.fc13\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-08T12:54:00", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-08-06T00:00:00", "type": "openvas", "title": "Fedora Update for mysql FEDORA-2010-11126", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008", "CVE-2010-1850", "CVE-2010-1848", "CVE-2008-7247", "CVE-2010-1849", "CVE-2009-4019"], "modified": "2018-01-08T00:00:00", "id": "OPENVAS:1361412562310862300", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862300", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mysql FEDORA-2010-11126\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"mysql on Fedora 12\";\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\n client/server implementation consisting of a server daemon (mysqld)\n and many different client programs and libraries. The base package\n contains the standard MySQL client programs and generic MySQL files.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-August/044875.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862300\");\n script_version(\"$Revision: 8314 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-08 09:01:01 +0100 (Mon, 08 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-08-06 10:34:50 +0200 (Fri, 06 Aug 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-11126\");\n script_cve_id(\"CVE-2010-2008\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2008-7247\", \"CVE-2009-4019\");\n script_name(\"Fedora Update for mysql FEDORA-2010-11126\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC12\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.47~2.fc12\", rls:\"FC12\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-18T10:58:05", "description": "Check for the Version of mysql", "cvss3": {}, "published": "2010-08-06T00:00:00", "type": "openvas", "title": "Fedora Update for mysql FEDORA-2010-11126", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2008", "CVE-2010-1850", "CVE-2010-1848", "CVE-2008-7247", "CVE-2010-1849", "CVE-2009-4019"], "modified": "2017-12-18T00:00:00", "id": "OPENVAS:862300", "href": "http://plugins.openvas.org/nasl.php?oid=862300", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mysql FEDORA-2010-11126\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"mysql on Fedora 12\";\ntag_insight = \"MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\n client/server implementation consisting of a server daemon (mysqld)\n and many different client programs and libraries. The base package\n contains the standard MySQL client programs and generic MySQL files.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-August/044875.html\");\n script_id(862300);\n script_version(\"$Revision: 8153 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-18 07:30:39 +0100 (Mon, 18 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-08-06 10:34:50 +0200 (Fri, 06 Aug 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-11126\");\n script_cve_id(\"CVE-2010-2008\", \"CVE-2010-1848\", \"CVE-2010-1849\", \"CVE-2010-1850\", \"CVE-2008-7247\", \"CVE-2009-4019\");\n script_name(\"Fedora Update for mysql FEDORA-2010-11126\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mysql\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC12\")\n{\n\n if ((res = isrpmvuln(pkg:\"mysql\", rpm:\"mysql~5.1.47~2.fc12\", rls:\"FC12\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:56", "description": "This host is missing an important security update according to\n Mac OS X 10.5.8 Update/Mac OS X Security Update 2011-004.", "cvss3": {}, "published": "2011-08-19T00:00:00", "type": "openvas", "title": "Mac OS X v10.6.8 Multiple Vulnerabilities (2011-004)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4651", "CVE-2011-0197", "CVE-2011-0196", "CVE-2010-0740", "CVE-2011-0211", "CVE-2011-0202", "CVE-2011-0199", "CVE-2010-3790", "CVE-2011-0206", "CVE-2011-0204", "CVE-2010-3837", "CVE-2011-0719", "CVE-2011-0201", "CVE-2010-2632", "CVE-2010-3835", "CVE-2011-0210", "CVE-2011-1132", "CVE-2010-3833", "CVE-2010-4180", "CVE-2011-0208", "CVE-2011-0203", "CVE-2011-0212", "CVE-2009-3245", "CVE-2011-0213", "CVE-2011-0014", "CVE-2010-3682", "CVE-2010-3836", "CVE-2011-0195", "CVE-2010-3677", "CVE-2011-0715", "CVE-2010-3834", "CVE-2011-0200", "CVE-2010-3838", "CVE-2011-0205", "CVE-2010-3864", "CVE-2011-0198", "CVE-2011-0209", "CVE-2011-0207", "CVE-2010-3069"], "modified": "2019-03-19T00:00:00", "id": "OPENVAS:1361412562310902466", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310902466", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_macosx_su11-004.nasl 14307 2019-03-19 10:09:27Z cfischer $\n#\n# Mac OS X v10.6.8 Multiple Vulnerabilities (2011-004)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.902466\");\n script_version(\"$Revision: 14307 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 11:09:27 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-19 15:17:22 +0200 (Fri, 19 Aug 2011)\");\n script_cve_id(\"CVE-2011-0196\", \"CVE-2011-0197\", \"CVE-2011-0198\", \"CVE-2011-0199\",\n \"CVE-2011-0200\", \"CVE-2011-0201\", \"CVE-2011-0202\", \"CVE-2011-0203\",\n \"CVE-2011-0204\", \"CVE-2011-0205\", \"CVE-2011-0206\", \"CVE-2011-1132\",\n \"CVE-2010-2632\", \"CVE-2011-0195\", \"CVE-2011-0207\", \"CVE-2010-3677\",\n \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\",\n \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2009-3245\",\n \"CVE-2010-0740\", \"CVE-2010-3864\", \"CVE-2010-4180\", \"CVE-2011-0014\",\n \"CVE-2010-4651\", \"CVE-2011-0208\", \"CVE-2011-0209\", \"CVE-2011-0210\",\n \"CVE-2011-0211\", \"CVE-2010-3790\", \"CVE-2011-0213\", \"CVE-2010-3069\",\n \"CVE-2011-0719\", \"CVE-2011-0212\", \"CVE-2011-0715\");\n script_bugtraq_id(48437, 48443, 48436, 48447, 48416, 48426, 48427, 48418, 48437,\n 48439, 48429, 48422, 43819, 47668, 48444, 42646, 42599, 43676,\n 38562, 39013, 44884, 45164, 46264, 46768, 48440, 48419, 48442,\n 48420, 44794, 48430, 43212, 46597, 46734);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Mac OS X v10.6.8 Multiple Vulnerabilities (2011-004)\");\n script_xref(name:\"URL\", value:\"http://support.apple.com/kb/HT1222\");\n script_xref(name:\"URL\", value:\"http://support.apple.com/kb/HT1338\");\n script_xref(name:\"URL\", value:\"http://lists.apple.com/archives/security-announce/2011/Jun/msg00000.html\");\n\n script_copyright(\"Copyright (c) 2011 SecPod\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Mac OS X Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/osx_name\", \"ssh/login/osx_version\", re:\"ssh/login/osx_version=^10\\.[0-6]\\.\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to execute arbitrary code in\n the context of the browser, inject scripts, bypass certain security\n restrictions or cause a denial-of-service condition.\");\n script_tag(name:\"affected\", value:\"ATS,\n MySQL,\n patch,\n Samba,\n Kernel,\n libxslt,\n OpenSSL,\n AirPort,\n ImageIO,\n OpenSSL,\n MobileMe,\n App Store,\n ColorSync,\n QuickLook,\n QuickTime,\n Libsystem,\n FTP Server,\n servermgrd,\n subversion,\n CoreGraphics,\n CoreFoundation,\n Certificate Trust Policy and\n International Components for Unicode.\");\n script_tag(name:\"insight\", value:\"Please see the references for more information on the vulnerabilities.\");\n script_tag(name:\"solution\", value:\"Run Mac Updates and update the Security Update 2011-004\");\n script_tag(name:\"summary\", value:\"This host is missing an important security update according to\n Mac OS X 10.5.8 Update/Mac OS X Security Update 2011-004.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"pkg-lib-macosx.inc\");\ninclude(\"version_func.inc\");\n\nosName = get_kb_item(\"ssh/login/osx_name\");\nif(!osName)\n exit(0);\n\nosVer = get_kb_item(\"ssh/login/osx_version\");\nif(!osVer)\n exit(0);\n\nif(\"Mac OS X\" >< osName || \"Mac OS X Server\" >< osName)\n{\n if(version_is_less_equal(version:osVer, test_version:\"10.5.8\") ||\n version_in_range(version:osVer, test_version:\"10.6\", test_version2:\"10.6.7\"))\n {\n if(isosxpkgvuln(fixed:\"com.apple.pkg.update.security.\", diff:\"2011.004\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-09-04T14:19:38", "description": "This host is missing an important security update according to\n Mac OS X 10.5.8 Update/Mac OS X Security Update 2011-004.", "cvss3": {}, "published": "2011-08-19T00:00:00", "type": "openvas", "title": "Mac OS X v10.6.8 Multiple Vulnerabilities (2011-004)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4651", "CVE-2011-0197", "CVE-2011-0196", "CVE-2010-0740", "CVE-2011-0211", "CVE-2011-0202", "CVE-2011-0199", "CVE-2010-3790", "CVE-2011-0206", "CVE-2011-0204", "CVE-2010-3837", "CVE-2011-0719", "CVE-2011-0201", "CVE-2010-2632", "CVE-2010-3835", "CVE-2011-0210", "CVE-2011-1132", "CVE-2010-3833", "CVE-2010-4180", "CVE-2011-0208", "CVE-2011-0203", "CVE-2011-0212", "CVE-2009-3245", "CVE-2011-0213", "CVE-2011-0014", "CVE-2010-3682", "CVE-2010-3836", "CVE-2011-0195", "CVE-2010-3677", "CVE-2011-0715", "CVE-2010-3834", "CVE-2011-0200", "CVE-2010-3838", "CVE-2011-0205", "CVE-2010-3864", "CVE-2011-0198", "CVE-2011-0209", "CVE-2011-0207", "CVE-2010-3069"], "modified": "2017-08-28T00:00:00", "id": "OPENVAS:902466", "href": "http://plugins.openvas.org/nasl.php?oid=902466", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_macosx_su11-004.nasl 7015 2017-08-28 11:51:24Z teissa $\n#\n# Mac OS X v10.6.8 Multiple Vulnerabilities (2011-004)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow attackers to execute arbitrary code in\n the context of the browser, inject scripts, bypass certain security\n restrictions or cause a denial-of-service condition.\n Impact Level: System/Application\";\ntag_affected = \"ATS,\n MySQL,\n patch,\n Samba,\n Kernel,\n libxslt,\n OpenSSL,\n AirPort,\n ImageIO,\n OpenSSL,\n MobileMe,\n App Store,\n ColorSync,\n QuickLook,\n QuickTime,\n Libsystem,\n FTP Server,\n servermgrd,\n subversion,\n CoreGraphics,\n CoreFoundation,\n Certificate Trust Policy and\n International Components for Unicode.\";\ntag_insight = \"For more information on the vulnerabilities refer to the links below.\";\ntag_solution = \"Run Mac Updates and update the Security Update 2011-004\n For updates refer to http://support.apple.com/kb/HT1338\";\ntag_summary = \"This host is missing an important security update according to\n Mac OS X 10.5.8 Update/Mac OS X Security Update 2011-004.\";\n\nif(description)\n{\n script_id(902466);\n script_version(\"$Revision: 7015 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-08-28 13:51:24 +0200 (Mon, 28 Aug 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-19 15:17:22 +0200 (Fri, 19 Aug 2011)\");\n script_cve_id(\"CVE-2011-0196\", \"CVE-2011-0197\", \"CVE-2011-0198\", \"CVE-2011-0199\",\n \"CVE-2011-0200\", \"CVE-2011-0201\", \"CVE-2011-0202\", \"CVE-2011-0203\",\n \"CVE-2011-0204\", \"CVE-2011-0205\", \"CVE-2011-0206\", \"CVE-2011-1132\",\n \"CVE-2010-2632\", \"CVE-2011-0195\", \"CVE-2011-0207\", \"CVE-2010-3677\",\n \"CVE-2010-3682\", \"CVE-2010-3833\", \"CVE-2010-3834\", \"CVE-2010-3835\",\n \"CVE-2010-3836\", \"CVE-2010-3837\", \"CVE-2010-3838\", \"CVE-2009-3245\",\n \"CVE-2010-0740\", \"CVE-2010-3864\", \"CVE-2010-4180\", \"CVE-2011-0014\",\n \"CVE-2010-4651\", \"CVE-2011-0208\", \"CVE-2011-0209\", \"CVE-2011-0210\",\n \"CVE-2011-0211\", \"CVE-2010-3790\", \"CVE-2011-0213\", \"CVE-2010-3069\",\n \"CVE-2011-0719\", \"CVE-2011-0212\", \"CVE-2011-0715\");\n script_bugtraq_id(48437, 48443, 48436, 48447, 48416, 48426, 48427, 48418, 48437,\n 48439, 48429, 48422, 43819, 47668, 48444, 42646, 42599, 43676,\n 38562, 39013, 44884, 45164, 46264, 46768, 48440, 48419, 48442,\n 48420, 44794, 48430, 43212, 46597, 46734);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Mac OS X v10.6.8 Multiple Vulnerabilities (2011-004)\");\n script_xref(name : \"URL\" , value : \"http://support.apple.com/kb/HT1222\");\n script_xref(name : \"URL\" , value : \"http://support.apple.com/kb/HT1338\");\n script_xref(name : \"URL\" , value : \"http://lists.apple.com/archives/security-announce/2011/Jun/msg00000.html\");\n\n script_copyright(\"Copyright (c) 2011 SecPod\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Mac OS X Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_require_ports(\"Services/ssh\", 22);\n script_mandatory_keys(\"ssh/login/osx_name\",\"ssh/login/osx_version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-macosx.inc\");\ninclude(\"version_func.inc\");\n\n## Get the OS name\nosName = get_kb_item(\"ssh/login/osx_name\");\nif(!osName){\n exit (0);\n}\n\n## Get the OS Version\nosVer = get_kb_item(\"ssh/login/osx_version\");\nif(!osVer){\n exit(0);\n}\n\n## Check for the Mac OS X and Mac OS X Server\nif(\"Mac OS X\" >< osName || \"Mac OS X Server\" >< osName)\n{\n ## Check the affected OS versions\n if(version_is_less_equal(version:osVer, test_version:\"10.5.8\") ||\n version_in_range(version:osVer, test_version:\"10.6\", test_version2:\"10.6.7\"))\n {\n ## Check for the security update 2011.004\n if(isosxpkgvuln(fixed:\"com.apple.pkg.update.security.\", diff:\"2011.004\"))\n {\n security_message(0);\n exit(0);\n }\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:50", "description": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files. ", "edition": 2, "cvss3": {}, "published": "2010-10-05T13:15:08", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: mysql-5.1.50-2.fc14", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3676", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"], "modified": "2010-10-05T13:15:08", "id": "FEDORA:1BD55110A79", "href": "", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "description": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files. ", "edition": 2, "cvss3": {}, "published": "2010-10-05T09:34:37", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: mysql-5.1.50-2.fc13", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1848", "CVE-2010-1849", "CVE-2010-1850", "CVE-2010-2008", "CVE-2010-3676", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683"], "modified": "2010-10-05T09:34:37", "id": "FEDORA:3C1241110D3", "href": "", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "description": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files. ", "edition": 2, "cvss3": {}, "published": "2010-07-27T02:41:30", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: mysql-5.1.48-2.fc13", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1848", "CVE-2010-1849", "CVE-2010-1850", "CVE-2010-2008"], "modified": "2010-07-27T02:41:30", "id": "FEDORA:0D80C11115E", "href": "", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "description": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files. ", "edition": 2, "cvss3": {}, "published": "2010-08-03T00:36:28", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: mysql-5.1.47-2.fc12", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-7247", "CVE-2009-4019", "CVE-2010-1848", "CVE-2010-1849", "CVE-2010-1850", "CVE-2010-2008"], "modified": "2010-08-03T00:36:28", "id": "FEDORA:32B5F1112EF", "href": "", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "metasploit": [{"lastseen": "2021-04-07T02:43:39", "description": "\n", "edition": 2, "cvss3": {}, "published": "1976-01-01T00:00:00", "type": "metasploit", "title": "RHSA-2011:0164: mysql security update", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "1976-01-01T00:00:00", "id": "MSF:ILITIES/LINUXRPM-RHSA-2011-0164/", "href": "", "sourceData": "", "sourceHref": "", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-04-07T02:43:45", "description": "\n", "edition": 2, "cvss3": {}, "published": "1976-01-01T00:00:00", "type": "metasploit", "title": "RHSA-2010:0825: mysql security update", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3677", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "1976-01-01T00:00:00", "id": "MSF:ILITIES/LINUXRPM-RHSA-2010-0825/", "href": "", "sourceData": "", "sourceHref": "", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "redhat": [{"lastseen": "2021-10-19T18:40:29", "description": "MySQL is a multi-user, multi-threaded SQL database server. It consists of\nthe MySQL server daemon (mysqld) and many client programs and libraries.\n\nThe MySQL PolyFromWKB() function did not sanity check Well-Known Binary\n(WKB) data, which could allow a remote, authenticated attacker to crash\nmysqld. (CVE-2010-3840)\n\nA flaw in the way MySQL processed certain JOIN queries could allow a\nremote, authenticated attacker to cause excessive CPU use (up to 100%), if\na stored procedure contained JOIN queries, and that procedure was executed\ntwice in sequence. (CVE-2010-3839)\n\nA flaw in the way MySQL processed queries that provide a mixture of numeric\nand longblob data types to the LEAST or GREATEST function, could allow a\nremote, authenticated attacker to crash mysqld. (CVE-2010-3838)\n\nA flaw in the way MySQL processed PREPARE statements containing both\nGROUP_CONCAT and the WITH ROLLUP modifier could allow a remote,\nauthenticated attacker to crash mysqld. (CVE-2010-3837)\n\nMySQL did not properly pre-evaluate LIKE arguments in view prepare mode,\npossibly allowing a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3836)\n\nA flaw in the way MySQL processed statements that assign a value to a\nuser-defined variable and that also contain a logical value evaluation\ncould allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3835)\n\nA flaw in the way MySQL evaluated the arguments of extreme-value functions,\nsuch as LEAST and GREATEST, could allow a remote, authenticated attacker to\ncrash mysqld. (CVE-2010-3833)\n\nA flaw in the way MySQL handled LOAD DATA INFILE requests allowed MySQL to\nsend OK packets even when there were errors. (CVE-2010-3683)\n\nA flaw in the way MySQL processed EXPLAIN statements for some complex\nSELECT queries could allow a remote, authenticated attacker to crash\nmysqld. (CVE-2010-3682)\n\nA flaw in the way MySQL processed certain alternating READ requests\nprovided by HANDLER statements could allow a remote, authenticated attacker\nto crash mysqld. (CVE-2010-3681)\n\nA flaw in the way MySQL processed CREATE TEMPORARY TABLE statements that\ndefine NULL columns when using the InnoDB storage engine, could allow a\nremote, authenticated attacker to crash mysqld. (CVE-2010-3680)\n\nA flaw in the way MySQL processed certain values provided to the BINLOG\nstatement caused MySQL to read unassigned memory. A remote, authenticated\nattacker could possibly use this flaw to crash mysqld. (CVE-2010-3679)\n\nA flaw in the way MySQL processed SQL queries containing IN or CASE\nstatements, when a NULL argument was provided as one of the arguments to\nthe query, could allow a remote, authenticated attacker to crash mysqld.\n(CVE-2010-3678)\n\nA flaw in the way MySQL processed JOIN queries that attempt to retrieve\ndata from a unique SET column could allow a remote, authenticated attacker\nto crash mysqld. (CVE-2010-3677)\n\nNote: CVE-2010-3840, CVE-2010-3838, CVE-2010-3837, CVE-2010-3835,\nCVE-2010-3833, CVE-2010-3682, CVE-2010-3681, CVE-2010-3680, CVE-2010-3678,\nand CVE-2010-3677 only cause a temporary denial of service, as mysqld was\nautomatically restarted after each crash.\n\nThese updated packages upgrade MySQL to version 5.1.52. Refer to the MySQL\nrelease notes for a full list of changes:\n\nhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-52.html\n\nAll MySQL users should upgrade to these updated packages, which correct\nthese issues. After installing this update, the MySQL server daemon\n(mysqld) will be restarted automatically.\n", "cvss3": {}, "published": "2011-01-18T00:00:00", "type": "redhat", "title": "(RHSA-2011:0164) Moderate: mysql security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2018-06-06T16:24:08", "id": "RHSA-2011:0164", "href": "https://access.redhat.com/errata/RHSA-2011:0164", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-10-21T04:46:24", "description": "MySQL is a multi-user, multi-threaded SQL database server. It consists of\nthe MySQL server daemon (mysqld) and many client programs and libraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity check\nWell-Known Binary (WKB) data. A remote, authenticated attacker could use\nspecially-crafted WKB data to crash mysqld. This issue only caused a\ntemporary denial of service, as mysqld was automatically restarted after\nthe crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain JOIN queries. If a\nstored procedure contained JOIN queries, and that procedure was executed\ntwice in sequence, it could cause an infinite loop, leading to excessive\nCPU use (up to 100%). A remote, authenticated attacker could use this flaw\nto cause a denial of service. (CVE-2010-3839)\n\nA flaw was found in the way MySQL processed queries that provide a mixture\nof numeric and longblob data types to the LEAST or GREATEST function. A\nremote, authenticated attacker could use this flaw to crash mysqld. This\nissue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2010-3838)\n\nA flaw was found in the way MySQL processed PREPARE statements containing\nboth GROUP_CONCAT and the WITH ROLLUP modifier. A remote, authenticated\nattacker could use this flaw to crash mysqld. This issue only caused a\ntemporary denial of service, as mysqld was automatically restarted after\nthe crash. (CVE-2010-3837)\n\nIt was found that MySQL did not properly pre-evaluate LIKE arguments in\nview prepare mode. A remote, authenticated attacker could possibly use this\nflaw to crash mysqld. (CVE-2010-3836)\n\nA flaw was found in the way MySQL processed statements that assign a value\nto a user-defined variable and that also contain a logical value\nevaluation. A remote, authenticated attacker could use this flaw to crash\nmysqld. This issue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2010-3835)\n\nA flaw was found in the way MySQL evaluated the arguments of extreme-value\nfunctions, such as LEAST and GREATEST. A remote, authenticated attacker\ncould use this flaw to crash mysqld. This issue only caused a temporary\ndenial of service, as mysqld was automatically restarted after the crash.\n(CVE-2010-3833)\n\nA flaw was found in the way MySQL processed EXPLAIN statements for some\ncomplex SELECT queries. A remote, authenticated attacker could use this\nflaw to crash mysqld. This issue only caused a temporary denial of service,\nas mysqld was automatically restarted after the crash. (CVE-2010-3682)\n\nA flaw was found in the way MySQL processed certain alternating READ\nrequests provided by HANDLER statements. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash. This\nissue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2010-3681)\n\nA flaw was found in the way MySQL processed CREATE TEMPORARY TABLE\nstatements that define NULL columns when using the InnoDB storage engine. A\nremote, authenticated attacker could use this flaw to crash mysqld. This\nissue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2010-3680)\n\nA flaw was found in the way MySQL processed JOIN queries that attempt to\nretrieve data from a unique SET column. A remote, authenticated attacker\ncould use this flaw to crash mysqld. This issue only caused a temporary\ndenial of service, as mysqld was automatically restarted after the crash.\n(CVE-2010-3677)\n\nAll MySQL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing this\nupdate, the MySQL server daemon (mysqld) will be restarted automatically.\n", "cvss3": {}, "published": "2010-11-03T00:00:00", "type": "redhat", "title": "(RHSA-2010:0825) Moderate: mysql security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3677", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2017-09-08T08:14:19", "id": "RHSA-2010:0825", "href": "https://access.redhat.com/errata/RHSA-2010:0825", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-10-21T04:44:31", "description": "MySQL is a multi-user, multi-threaded SQL database server. It consists of\nthe MySQL server daemon (mysqld) and many client programs and libraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity check\nWell-Known Binary (WKB) data. A remote, authenticated attacker could use\nspecially-crafted WKB data to crash mysqld. This issue only caused a\ntemporary denial of service, as mysqld was automatically restarted after\nthe crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain alternating READ\nrequests provided by HANDLER statements. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash. This\nissue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2010-3681)\n\nA directory traversal flaw was found in the way MySQL handled the\nparameters of the MySQL COM_FIELD_LIST network protocol command. A remote,\nauthenticated attacker could use this flaw to obtain descriptions of the\nfields of an arbitrary table using a request with a specially-crafted\ntable name. (CVE-2010-1848)\n\nAll MySQL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing this\nupdate, the MySQL server daemon (mysqld) will be restarted automatically.\n", "cvss3": {}, "published": "2010-11-03T00:00:00", "type": "redhat", "title": "(RHSA-2010:0824) Moderate: mysql security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1848", "CVE-2010-3681", "CVE-2010-3840"], "modified": "2017-09-08T08:12:22", "id": "RHSA-2010:0824", "href": "https://access.redhat.com/errata/RHSA-2010:0824", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:36:41", "description": "[5.1.52-1.1]\n- Update to MySQL 5.1.52, for various fixes described at\n http://dev.mysql.com/doc/refman/5.1/en/news-5-1-52.html\n including numerous small security issues\nResolves: #652553\n- Sync with current Fedora package; this includes:\n- Duplicate COPYING and EXCEPTIONS-CLIENT in -libs and -embedded subpackages,\n to ensure they are available when any subset of mysql RPMs are installed,\n per revised packaging guidelines\n- Allow init script's STARTTIMEOUT/STOPTIMEOUT to be overridden from sysconfig", "cvss3": {}, "published": "2011-02-10T00:00:00", "type": "oraclelinux", "title": "mysql security update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-3836", "CVE-2010-3683", "CVE-2010-3677", "CVE-2010-3838"], "modified": "2011-02-10T00:00:00", "id": "ELSA-2011-0164", "href": "http://linux.oracle.com/errata/ELSA-2011-0164.html", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:37:46", "description": " \n[5.0.77-4.4]\r\n- Add fixes for CVE-2010-3677, CVE-2010-3680, CVE-2010-3681, CVE-2010-3682,\r\n CVE-2010-3833, CVE-2010-3835, CVE-2010-3836, CVE-2010-3837, CVE-2010-3838,\r\n CVE-2010-3839, CVE-2010-3840\r\nResolves: #645642\r\n- Backpatch strmov fix so that code can be tested on more recent platforms ", "cvss3": {}, "published": "2010-11-03T00:00:00", "type": "oraclelinux", "title": "mysql security update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3836", "CVE-2010-3677", "CVE-2010-3838"], "modified": "2010-11-03T00:00:00", "id": "ELSA-2010-0825", "href": "http://linux.oracle.com/errata/ELSA-2010-0825.html", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:39:14", "description": "[4.1.22-2.el4.4]\n- Add fixes for CVE-2010-1848, CVE-2010-3681, CVE-2010-3840\nResolves: #645637\n- Backpatch longlong overflow fix so that code can be tested on\n more recent platforms ", "cvss3": {}, "published": "2010-11-03T00:00:00", "type": "oraclelinux", "title": "mysql security update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2010-3681", "CVE-2010-3840", "CVE-2010-1848"], "modified": "2010-11-03T00:00:00", "id": "ELSA-2010-0824", "href": "http://linux.oracle.com/errata/ELSA-2010-0824.html", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2022-01-04T13:17:49", "description": "It was discovered that MySQL incorrectly handled certain requests with the \nUPGRADE DATA DIRECTORY NAME command. An authenticated user could exploit \nthis to make MySQL crash, causing a denial of service. This issue only \naffected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-2008)\n\nIt was discovered that MySQL incorrectly handled joins involving a table \nwith a unique SET column. An authenticated user could exploit this to make \nMySQL crash, causing a denial of service. This issue only affected Ubuntu \n6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3677)\n\nIt was discovered that MySQL incorrectly handled NULL arguments to IN() or \nCASE operations. An authenticated user could exploit this to make MySQL \ncrash, causing a denial of service. This issue only affected Ubuntu 9.10 \nand 10.04 LTS. (CVE-2010-3678)\n\nIt was discovered that MySQL incorrectly handled malformed arguments to the \nBINLOG statement. An authenticated user could exploit this to make MySQL \ncrash, causing a denial of service. This issue only affected Ubuntu 9.10 \nand 10.04 LTS. (CVE-2010-3679)\n\nIt was discovered that MySQL incorrectly handled the use of TEMPORARY \nInnoDB tables with nullable columns. An authenticated user could exploit \nthis to make MySQL crash, causing a denial of service. This issue only \naffected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3680)\n\nIt was discovered that MySQL incorrectly handled alternate reads from two \nindexes on a table using the HANDLER interface. An authenticated user could \nexploit this to make MySQL crash, causing a denial of service. This issue \nonly affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. \n(CVE-2010-3681)\n\nIt was discovered that MySQL incorrectly handled use of EXPLAIN with \ncertain queries. An authenticated user could exploit this to make MySQL \ncrash, causing a denial of service. This issue only affected Ubuntu \n6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3682)\n\nIt was discovered that MySQL incorrectly handled error reporting when using \nLOAD DATA INFILE and would incorrectly raise an assert in certain \ncircumstances. An authenticated user could exploit this to make MySQL \ncrash, causing a denial of service. This issue only affected Ubuntu 9.10 \nand 10.04 LTS. (CVE-2010-3683)\n\nIt was discovered that MySQL incorrectly handled propagation during \nevaluation of arguments to extreme-value functions. An authenticated user \ncould exploit this to make MySQL crash, causing a denial of service. This \nissue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10. \n(CVE-2010-3833)\n\nIt was discovered that MySQL incorrectly handled materializing a derived \ntable that required a temporary table for grouping. An authenticated user \ncould exploit this to make MySQL crash, causing a denial of service. \n(CVE-2010-3834)\n\nIt was discovered that MySQL incorrectly handled certain user-variable \nassignment expressions that are evaluated in a logical expression context. \nAn authenticated user could exploit this to make MySQL crash, causing a \ndenial of service. This issue only affected Ubuntu 8.04 LTS, 9.10, \n10.04 LTS and 10.10. (CVE-2010-3835)\n\nIt was discovered that MySQL incorrectly handled pre-evaluation of LIKE \npredicates during view preparation. An authenticated user could exploit \nthis to make MySQL crash, causing a denial of service. (CVE-2010-3836)\n\nIt was discovered that MySQL incorrectly handled using GROUP_CONCAT() and \nWITH ROLLUP together. An authenticated user could exploit this to make \nMySQL crash, causing a denial of service. (CVE-2010-3837)\n\nIt was discovered that MySQL incorrectly handled certain queries using a \nmixed list of numeric and LONGBLOB arguments to the GREATEST() or LEAST() \nfunctions. An authenticated user could exploit this to make MySQL crash, \ncausing a denial of service. (CVE-2010-3838)\n\nIt was discovered that MySQL incorrectly handled queries with nested joins \nwhen used from stored procedures and prepared statements. An authenticated \nuser could exploit this to make MySQL hang, causing a denial of service. \nThis issue only affected Ubuntu 9.10, 10.04 LTS and 10.10. (CVE-2010-3839)\n\nIt was discovered that MySQL incorrectly handled improper WKB data passed \nto the PolyFromWKB() function. An authenticated user could exploit this to \nmake MySQL crash, causing a denial of service. (CVE-2010-3840)\n", "cvss3": {}, "published": "2010-11-11T00:00:00", "type": "ubuntu", "title": "MySQL vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3679", "CVE-2010-3837", "CVE-2010-3839", "CVE-2010-3682", "CVE-2010-2008", "CVE-2010-3677", "CVE-2010-3838", "CVE-2010-3681", "CVE-2010-3840", "CVE-2010-3835", "CVE-2010-3833", "CVE-2010-3683", "CVE-2010-3678", "CVE-2010-3834", "CVE-2010-3836", "CVE-2010-3680"], "modified": "2010-11-11T00:00:00", "id": "USN-1017-1", "href": "https://ubuntu.com/security/notices/USN-1017-1", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-01-04T13:06:52", "description": "Multiple security issues were discovered in MySQL and this update includes \nnew upstream MySQL versions to fix these issues.\n\nMySQL has been updated to 5.1.61 in Ubuntu 10.04 LTS, Ubuntu 10.10, \nUbuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS has been updated to \nMySQL 5.0.95.\n\nIn addition to security fixes, the updated packages contain bug fixes, new \nfeatures, and possibly incompatible changes.\n\nPlease see the following for more information:\n\n<http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html> \n<http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html> \n<http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html>\n", "cvss3": {}, "published": "2012-03-12T00:00:00", "type": "ubuntu", "title": "MySQL vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 6.8, "obtainAllPrivilege": true, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 8.5, "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1848", "CVE-2012-0102", "CVE-2012-0115", "CVE-2008-7247", "CVE-2010-2008", "CVE-2012-0484", "CVE-2012-0087", "CVE-2010-1850", "CVE-2010-3681", "CVE-2012-0119", "CVE-2012-0488", "CVE-2012-0490", "CVE-2009-4484", "CVE-2009-2446", "CVE-2008-3963", "CVE-2009-4030", "CVE-2010-3839", "CVE-2008-4098", "CVE-2010-3836", "CVE-2010-3680", "CVE-2012-0075", "CVE-2012-0495", "CVE-2012-0491", "CVE-2008-4456", "CVE-2009-4019", "CVE-2012-0118", "CVE-2012-0493", "CVE-2012-0494", "CVE-2010-1626", "CVE-2010-3834", "CVE-2012-0485", "CVE-2010-1849", "CVE-2012-0496", "CVE-2010-3837", "CVE-2012-0101", "CVE-2012-0112", "CVE-2012-0113", "CVE-2010-3677", "CVE-2011-2262", "CVE-2012-0116", "CVE-2012-0117", "CVE-2012-0114", "CVE-2012-0487", "CVE-2010-3835", "CVE-2010-3833", "CVE-2012-0486", "CVE-2010-1621", "CVE-2010-3840", "CVE-2007-5925", "CVE-2010-3679", "CVE-2010-3682", "CVE-2010-3838", "CVE-2012-0489", "CVE-2012-0492", "CVE-2010-3683", "CVE-2010-3678", "CVE-2012-0120"], "modified": "2012-03-12T00:00:00", "id": "USN-1397-1", "href": "https://ubuntu.com/security/notices/USN-1397-1", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:37", "description": "===========================================================\r\nUbuntu Security Notice USN-1017-1 November 11, 2010\r\nmysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities\r\nCVE-2010-2008, CVE-2010-3677, CVE-2010-3678, CVE-2010-3679,\r\nCVE-2010-3680, CVE-2010-3681, CVE-2010-3682, CVE-2010-3683,\r\nCVE-2010-3833, CVE-2010-3834, CVE-2010-3835, CVE-2010-3836,\r\nCVE-2010-3837, CVE-2010-3838, CVE-2010-3839, CVE-2010-3840\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 6.06 LTS\r\nUbuntu 8.04 LTS\r\nUbuntu 9.10\r\nUbuntu 10.04 LTS\r\nUbuntu 10.10\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 6.06 LTS:\r\n mysql-server-5.0 5.0.22-0ubuntu6.06.15\r\n\r\nUbuntu 8.04 LTS:\r\n mysql-server-5.0 5.0.51a-3ubuntu5.8\r\n\r\nUbuntu 9.10:\r\n mysql-server-5.1 5.1.37-1ubuntu5.5\r\n\r\nUbuntu 10.04 LTS:\r\n mysql-server-5.1 5.1.41-3ubuntu12.7\r\n\r\nUbuntu 10.10:\r\n mysql-server-5.1 5.1.49-1ubuntu8.1\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nDetails follow:\r\n\r\nIt was discovered that MySQL incorrectly handled certain requests with the\r\nUPGRADE DATA DIRECTORY NAME command. An authenticated user could exploit\r\nthis to make MySQL crash, causing a denial of service. This issue only\r\naffected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-2008)\r\n\r\nIt was discovered that MySQL incorrectly handled joins involving a table\r\nwith a unique SET column. An authenticated user could exploit this to make\r\nMySQL crash, causing a denial of service. This issue only affected Ubuntu\r\n6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3677)\r\n\r\nIt was discovered that MySQL incorrectly handled NULL arguments to IN() or\r\nCASE operations. An authenticated user could exploit this to make MySQL\r\ncrash, causing a denial of service. This issue only affected Ubuntu 9.10\r\nand 10.04 LTS. (CVE-2010-3678)\r\n\r\nIt was discovered that MySQL incorrectly handled malformed arguments to the\r\nBINLOG statement. An authenticated user could exploit this to make MySQL\r\ncrash, causing a denial of service. This issue only affected Ubuntu 9.10\r\nand 10.04 LTS. (CVE-2010-3679)\r\n\r\nIt was discovered that MySQL incorrectly handled the use of TEMPORARY\r\nInnoDB tables with nullable columns. An authenticated user could exploit\r\nthis to make MySQL crash, causing a denial of service. This issue only\r\naffected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3680)\r\n\r\nIt was discovered that MySQL incorrectly handled alternate reads from two\r\nindexes on a table using the HANDLER interface. An authenticated user could\r\nexploit this to make MySQL crash, causing a denial of service. This issue\r\nonly affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS.\r\n(CVE-2010-3681)\r\n\r\nIt was discovered that MySQL incorrectly handled use of EXPLAIN with\r\ncertain queries. An authenticated user could exploit this to make MySQL\r\ncrash, causing a denial of service. This issue only affected Ubuntu\r\n6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3682)\r\n\r\nIt was discovered that MySQL incorrectly handled error reporting when using\r\nLOAD DATA INFILE and would incorrectly raise an assert in certain\r\ncircumstances. An authenticated user could exploit this to make MySQL\r\ncrash, causing a denial of service. This issue only affected Ubuntu 9.10\r\nand 10.04 LTS. (CVE-2010-3683)\r\n\r\nIt was discovered that MySQL incorrectly handled propagation during\r\nevaluation of arguments to extreme-value functions. An authenticated user\r\ncould exploit this to make MySQL crash, causing a denial of service. This\r\nissue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10.\r\n(CVE-2010-3833)\r\n\r\nIt was discovered that MySQL incorrectly handled materializing a derived\r\ntable that required a temporary table for grouping. An authenticated user\r\ncould exploit this to make MySQL crash, causing a denial of service.\r\n(CVE-2010-3834)\r\n\r\nIt was discovered that MySQL incorrectly handled certain user-variable\r\nassignment expressions that are evaluated in a logical expression context.\r\nAn authenticated user could exploit this to make MySQL crash, causing a\r\ndenial of service. This issue only affected Ubuntu 8.04 LTS, 9.10,\r\n10.04 LTS and 10.10. (CVE-2010-3835)\r\n\r\nIt was discovered that MySQL incorrectly handled pre-evaluation of LIKE\r\npredicates during view preparation. An authenticated user could exploit\r\nthis to make MySQL crash, causing a denial of service. (CVE-2010-3836)\r\n\r\nIt was discovered that MySQL incorrectly handled using GROUP_CONCAT() and\r\nWITH ROLLUP together. An authenticated user could exploit this to make\r\nMySQL crash, causing a denial of service. (CVE-2010-3837)\r\n\r\nIt was discovered that MySQL incorrectly handled certain queries using a\r\nmixed list of numeric and LONGBLOB arguments to the GREATEST() or LEAST()\r\nfunctions. An authenticated user could exploit this to make MySQL crash,\r\ncausing a denial of service. (CVE-2010-3838)\r\n\r\nIt was discovered that MySQL incorrectly handled queries with nested joins\r\nwhen used from stored procedures and prepared statements. An authenticated\r\nuser could exploit this to make MySQL hang, causing a denial of service.\r\nThis issue only affected Ubuntu 9.10, 10.04 LTS and 10.10. (CVE-2010-3839)\r\n\r\nIt was discovered that MySQL incorrectly handled improper WKB data passed\r\nto the PolyFromWKB() function. An authenticated user could exploit this to\r\nmake MySQL crash, causing a denial of service. (CVE-2010-3840)\r\n\r\n\r\nUpdated packages for Ubuntu 6.06 LTS:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.15.diff.gz\r\n Size/MD5: 178188 38c129d7339c89f4eba4c19fd3b48a8e\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.15.dsc\r\n Size/MD5: 1765 c0d4e7d49f9857c71d8e91c1e7cc54b2\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22.orig.tar.gz\r\n Size/MD5: 18446645 2b8f36364373461190126817ec872031\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.15_all.deb\r\n Size/MD5: 39978 7ebcc42187ede799d071276d38f83744\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.15_all.deb\r\n Size/MD5: 42518 6e367452a0b3d168c574ae64219137b1\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.15_all.deb\r\n Size/MD5: 39982 acd2b86e437fb3734f460a60c47cee44\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.15_amd64.deb\r\n Size/MD5: 6738602 55b4fd61adaad42c04b76ae0877a8e83\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.15_amd64.deb\r\n Size/MD5: 1424234 722761a4b65614aa2cc8efba06ad5355\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.15_amd64.deb\r\n Size/MD5: 6900952 01a5e128ed55a06e1f903a9574c7ea61\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.15_amd64.deb\r\n Size/MD5: 22544490 29001d165026dc416d10ade074875cca\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.15_i386.deb\r\n Size/MD5: 6144586 01eac83af471566e10d59ae33f7d5fe0\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.15_i386.deb\r\n Size/MD5: 1385448 04a1b919fa386e3643d85eaeb492523b\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.15_i386.deb\r\n Size/MD5: 6280628 3a34833a57e23ea89f5170d97877b511\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.15_i386.deb\r\n Size/MD5: 21354962 ab094c08f1f58089191a7d22ae82cef2\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.15_powerpc.deb\r\n Size/MD5: 6888510 8a132e1b19c8d1098dfdfe7a49b4f209\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.15_powerpc.deb\r\n Size/MD5: 1465260 8075c27e698ec920ca6b903ef3e5ce49\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.15_powerpc.deb\r\n Size/MD5: 6948840 37c008fd0ceb7ae6b750e349809e6466\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.15_powerpc.deb\r\n Size/MD5: 22709850 02e275075e5f5ed187711e18f64c4952\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.15_sparc.deb\r\n Size/MD5: 6437636 fe08465f8cd8345ab7f25f9245ca42c9\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.15_sparc.deb\r\n Size/MD5: 1437450 c2de9127465bd162681ba142887627dd\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.15_sparc.deb\r\n Size/MD5: 6551944 7bd359130b6050359bf5ff0adb1a9b20\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.15_sparc.deb\r\n Size/MD5: 21975892 1093883548b2cddc46a4a2aea2647e97\r\n\r\nUpdated packages for Ubuntu 8.04 LTS:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.51a-3ubuntu5.8.diff.gz\r\n Size/MD5: 358579 56c0452e6f36686c9d05f7933468fe02\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.51a-3ubuntu5.8.dsc\r\n Size/MD5: 2071 1c364151ad3abb3134e357e1d50388a6\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.51a.orig.tar.gz\r\n Size/MD5: 17946664 6fae978908ad5eb790fa3f24f16dadba\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.51a-3ubuntu5.8_all.deb\r\n Size/MD5: 53298 63abcf36b00ba0d561e41de747147a98\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.51a-3ubuntu5.8_all.deb\r\n Size/MD5: 62088 1d8703413d7f71aade6445c9efabcc83\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.51a-3ubuntu5.8_all.deb\r\n Size/MD5: 55488 f130cf8f453bcfbc22690c1958fbea00\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-3ubuntu5.8_amd64.deb\r\n Size/MD5: 7614932 605808ad3b237f7f0ae1c21d6f79758a\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-3ubuntu5.8_amd64.deb\r\n Size/MD5: 1887226 ebb497ab886c9faca52a42552180c3fb\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-3ubuntu5.8_amd64.deb\r\n Size/MD5: 8252196 c3c737f644b47b805186ce7b00a6d33e\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-3ubuntu5.8_amd64.deb\r\n Size/MD5: 28161616 f1af5e0e4c18c5bbdc2bb4fff40fb8f2\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-3ubuntu5.8_i386.deb\r\n Size/MD5: 7223194 63dc0d96dd4ff34be31c9b6da6a72f27\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-3ubuntu5.8_i386.deb\r\n Size/MD5: 1832772 0dd80f740bcbe40122ed32577514a2d6\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-3ubuntu5.8_i386.deb\r\n Size/MD5: 7834082 5434145509e6a9ac7ab328f9a6979aa0\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-3ubuntu5.8_i386.deb\r\n Size/MD5: 27568916 3fb255106105df17bb48ba3af49474e0\r\n\r\n lpia architecture (Low Power Intel Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-3ubuntu5.8_lpia.deb\r\n Size/MD5: 7163494 a4a032940ebe2756cf44bb8b30fbe8b4\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-3ubuntu5.8_lpia.deb\r\n Size/MD5: 1828002 8791d74e55c730f2f8162428cb8d3d7c\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-3ubuntu5.8_lpia.deb\r\n Size/MD5: 7845656 ded7c6756b5d7a27b0194f532247bf31\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-3ubuntu5.8_lpia.deb\r\n Size/MD5: 27362950 ee96550d3a80a90b6b16eb1f1d5affd3\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-3ubuntu5.8_powerpc.deb\r\n Size/MD5: 7589774 9ee36ca16f7ec707666bbb45b39dca91\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-3ubuntu5.8_powerpc.deb\r\n Size/MD5: 1916848 8a3183f14b7ae5a63de8e9459e6922b0\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-3ubuntu5.8_powerpc.deb\r\n Size/MD5: 8245266 277ac8cba87b4e838aaf894749f9ce7e\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-3ubuntu5.8_powerpc.deb\r\n Size/MD5: 28354820 926ce81e465a584a2a0d1cc3329c063a\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-3ubuntu5.8_sparc.deb\r\n Size/MD5: 7202436 7b4b220badd74fd992ba8c6ff7b35ea0\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-3ubuntu5.8_sparc.deb\r\n Size/MD5: 1847528 44344dcfec06342310da94329b5227ce\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-3ubuntu5.8_sparc.deb\r\n Size/MD5: 7836440 c211e18849940108270801431c3ebf33\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-3ubuntu5.8_sparc.deb\r\n Size/MD5: 27650038 2667b9132784e43f5f8ceba7c355acf5\r\n\r\nUpdated packages for Ubuntu 9.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-dfsg-5.1_5.1.37-1ubuntu5.5.diff.gz\r\n Size/MD5: 343665 186b3a556b81532075ad6feb344cfe0c\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-dfsg-5.1_5.1.37-1ubuntu5.5.dsc\r\n Size/MD5: 2522 c7d66071d8d446783bcbb2cf0dfb6e3b\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-dfsg-5.1_5.1.37.orig.tar.gz\r\n Size/MD5: 17814352 a472b99a174592f052c37042764fea3e\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqlclient16-dev_5.1.37-1ubuntu5.5_all.deb\r\n Size/MD5: 65264 9d79bdf716a4d8a092d567157ee975be\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-client_5.1.37-1ubuntu5.5_all.deb\r\n Size/MD5: 65324 e0d910bdc10310194d99bc2c165ae333\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-common_5.1.37-1ubuntu5.5_all.deb\r\n Size/MD5: 71164 220c35b60d80d28224d2113bd143c686\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-server_5.1.37-1ubuntu5.5_all.deb\r\n Size/MD5: 65452 2861f2ea8fbf2abc314fd3cdf14872e0\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqlclient-dev_5.1.37-1ubuntu5.5_amd64.deb\r\n Size/MD5: 2402648 44b830a893d6e77bc617f97254ef7da8\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqlclient16_5.1.37-1ubuntu5.5_amd64.deb\r\n Size/MD5: 1960428 41178f99f4922a8290cc758df2340ab2\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqld-dev_5.1.37-1ubuntu5.5_amd64.deb\r\n Size/MD5: 5667062 b8a5623cead76e5950ec2f403ae663b8\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqld-pic_5.1.37-1ubuntu5.5_amd64.deb\r\n Size/MD5: 4437346 2423a9a6878cd44d606eced3bc197c2f\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-client-5.1_5.1.37-1ubuntu5.5_amd64.deb\r\n Size/MD5: 8837650 d7d866861a2498596dfee73287ef9813\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-server-5.1_5.1.37-1ubuntu5.5_amd64.deb\r\n Size/MD5: 7273026 3ac85a659f16dbd878053a2dd695d6a1\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-server-core-5.1_5.1.37-1ubuntu5.5_amd64.deb\r\n Size/MD5: 4128168 3161fe5ab9ce1296cd40938873f1b103\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqlclient-dev_5.1.37-1ubuntu5.5_i386.deb\r\n Size/MD5: 2332702 1ce8580e6af3b788a09c7d7a0a8d40ac\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqlclient16_5.1.37-1ubuntu5.5_i386.deb\r\n Size/MD5: 1904404 027b42bde9632c2065720ffcb6f738c7\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqld-dev_5.1.37-1ubuntu5.5_i386.deb\r\n Size/MD5: 5433794 e926b1d9b454cb9d89afa063ca2d663f\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqld-pic_5.1.37-1ubuntu5.5_i386.deb\r\n Size/MD5: 4211558 d2df1d1cd42197ca3bfca48b6e39ffe4\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-client-5.1_5.1.37-1ubuntu5.5_i386.deb\r\n Size/MD5: 8209846 0926ae62554a127a283d6f7a2605c279\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-server-5.1_5.1.37-1ubuntu5.5_i386.deb\r\n Size/MD5: 7187446 5c415f1385767b85b07a73dc48210744\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-server-core-5.1_5.1.37-1ubuntu5.5_i386.deb\r\n Size/MD5: 3841096 0363a16f629a35474853c04883bd5ab3\r\n\r\n armel architecture (ARM Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqlclient-dev_5.1.37-1ubuntu5.5_armel.deb\r\n Size/MD5: 2288474 20b98307f3d8eae926e9a267c83cc675\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqlclient16_5.1.37-1ubuntu5.5_armel.deb\r\n Size/MD5: 1792580 8416658c287fc47df4a88cfd975bc861\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqld-dev_5.1.37-1ubuntu5.5_armel.deb\r\n Size/MD5: 5287846 f7fb108f9c0040a6313ce7c1d71a037f\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqld-pic_5.1.37-1ubuntu5.5_armel.deb\r\n Size/MD5: 4311738 a8ac7c897f8d958f1945c29bc0e1cba6\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-client-5.1_5.1.37-1ubuntu5.5_armel.deb\r\n Size/MD5: 7415966 f4dff3cd298ca1cc1343443625df59c9\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-server-5.1_5.1.37-1ubuntu5.5_armel.deb\r\n Size/MD5: 6765750 0295731bc47b322cca7974b92b934f0d\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-server-core-5.1_5.1.37-1ubuntu5.5_armel.deb\r\n Size/MD5: 3464918 80261238e82a60574de5ad7ec947c006\r\n\r\n lpia architecture (Low Power Intel Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqlclient-dev_5.1.37-1ubuntu5.5_lpia.deb\r\n Size/MD5: 2322318 62a59caee4959c63fbbbb682052d8e20\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqlclient16_5.1.37-1ubuntu5.5_lpia.deb\r\n Size/MD5: 1905624 4d96043bd14b49f1860f1917e489c06b\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqld-dev_5.1.37-1ubuntu5.5_lpia.deb\r\n Size/MD5: 5398390 74731410a65f8452a6ae2bdc990d2418\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqld-pic_5.1.37-1ubuntu5.5_lpia.deb\r\n Size/MD5: 4182098 d9e13eb60231b2f5038938b5ef03ea86\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-client-5.1_5.1.37-1ubuntu5.5_lpia.deb\r\n Size/MD5: 8190806 9d16d8907b9d4da4b7bcf9b38a239453\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-server-5.1_5.1.37-1ubuntu5.5_lpia.deb\r\n Size/MD5: 7197878 8251d96c880ae454f2b399a0101dfb59\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-server-core-5.1_5.1.37-1ubuntu5.5_lpia.deb\r\n Size/MD5: 3828970 0097560c7892383fbf56080ab6d9c795\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqlclient-dev_5.1.37-1ubuntu5.5_powerpc.deb\r\n Size/MD5: 2419218 a0ced7255dd4a7d6f5221cfd4ec12c38\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqlclient16_5.1.37-1ubuntu5.5_powerpc.deb\r\n Size/MD5: 1935528 bb45cb56160edf9fb1eadbd5b3690a1b\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqld-dev_5.1.37-1ubuntu5.5_powerpc.deb\r\n Size/MD5: 5630372 611b47bbcad0e669bb662ce9a4a6665d\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqld-pic_5.1.37-1ubuntu5.5_powerpc.deb\r\n Size/MD5: 4363226 5c2610076f8df7d86e92aae18f238635\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-client-5.1_5.1.37-1ubuntu5.5_powerpc.deb\r\n Size/MD5: 8691618 fefe972a0a189ded67bf7aa16a1185b8\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-server-5.1_5.1.37-1ubuntu5.5_powerpc.deb\r\n Size/MD5: 7207692 585ce3dddb191f416e12c9f2b51a2004\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-server-core-5.1_5.1.37-1ubuntu5.5_powerpc.deb\r\n Size/MD5: 4063606 72da7ea5182956ba32f66d2ee23a3fdd\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqlclient-dev_5.1.37-1ubuntu5.5_sparc.deb\r\n Size/MD5: 2319342 70d608594f5cf135c1146abd43a8e445\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqlclient16_5.1.37-1ubuntu5.5_sparc.deb\r\n Size/MD5: 1926218 559f770cdb9cdec49bd724ca780b51af\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqld-dev_5.1.37-1ubuntu5.5_sparc.deb\r\n Size/MD5: 5293588 00a18546295d7765191d347a3414459a\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqld-pic_5.1.37-1ubuntu5.5_sparc.deb\r\n Size/MD5: 4080864 ecd088d30b64600dd893dd85c78ff05d\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-client-5.1_5.1.37-1ubuntu5.5_sparc.deb\r\n Size/MD5: 8335248 de8c6e0b6439708c6b0df095db0764bd\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-server-5.1_5.1.37-1ubuntu5.5_sparc.deb\r\n Size/MD5: 7299784 64bfe588882ef1c1ea7bab9d538d9385\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-server-core-5.1_5.1.37-1ubuntu5.5_sparc.deb\r\n Size/MD5: 3879404 a4da166556e276d7fbfb3afa10555b19\r\n\r\nUpdated packages for Ubuntu 10.04 LTS:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-dfsg-5.1_5.1.41-3ubuntu12.7.diff.gz\r\n Size/MD5: 341522 2dedee77a23f60a8923ef633c626bcab\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-dfsg-5.1_5.1.41-3ubuntu12.7.dsc\r\n Size/MD5: 2577 916ca7a18d8315fc01878d987b8fb2e9\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-dfsg-5.1_5.1.41.orig.tar.gz\r\n Size/MD5: 19970033 7652277028a7dedc6e1b5a9d87f6bfe6\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqlclient16-dev_5.1.41-3ubuntu12.7_all.deb\r\n Size/MD5: 94418 98013f0aa27b5cd56d6b0959755acb63\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-client_5.1.41-3ubuntu12.7_all.deb\r\n Size/MD5: 94476 90c21f8021ff74ef8f0b51c3361a67fc\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-common_5.1.41-3ubuntu12.7_all.deb\r\n Size/MD5: 98636 6a2cb0dca9993c5bd760e653af26bfba\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-server_5.1.41-3ubuntu12.7_all.deb\r\n Size/MD5: 94604 7ce993505db3145e27cbaa9561d9757f\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqlclient-dev_5.1.41-3ubuntu12.7_amd64.deb\r\n Size/MD5: 3223076 dd7a36078d8ffc4156002fa45fbd3496\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqlclient16_5.1.41-3ubuntu12.7_amd64.deb\r\n Size/MD5: 1986496 372d1279a872224bd9a23735719ccc3c\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqld-dev_5.1.41-3ubuntu12.7_amd64.deb\r\n Size/MD5: 5723882 bf86e090998e98ba3e3524674ce38399\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqld-pic_5.1.41-3ubuntu12.7_amd64.deb\r\n Size/MD5: 4471388 c02e1a665b1ff9f01e0d015b8723f84d\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-client-5.1_5.1.41-3ubuntu12.7_amd64.deb\r\n Size/MD5: 8748306 b97c6d4ce926a72389f8fc4bde987108\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-client-core-5.1_5.1.41-3ubuntu12.7_amd64.deb\r\n Size/MD5: 187866 eaeab5c4a74dbdbf7dc3491337b5816a\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-server-5.1_5.1.41-3ubuntu12.7_amd64.deb\r\n Size/MD5: 7104886 40289c8486583236f01f7b92d2ae850f\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-server-core-5.1_5.1.41-3ubuntu12.7_amd64.deb\r\n Size/MD5: 5002110 a042514c9d112495527838f9cc90b216\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-5.1/mysql-testsuite_5.1.41-3ubuntu12.7_amd64.deb\r\n Size/MD5: 5854888 889d471d902c1cc6e551bafa937ddba5\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqlclient-dev_5.1.41-3ubuntu12.7_i386.deb\r\n Size/MD5: 3120982 98846212f393e41fe3fdf1deeaf67164\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqlclient16_5.1.41-3ubuntu12.7_i386.deb\r\n Size/MD5: 1932800 1745df40283bd84666f2d2baf0e7b825\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqld-dev_5.1.41-3ubuntu12.7_i386.deb\r\n Size/MD5: 5483392 2dd6de38f8445b0a881465b866f22ed1\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/libmysqld-pic_5.1.41-3ubuntu12.7_i386.deb\r\n Size/MD5: 4252774 cc3f3566c0ffc1ad56256c72df0bba66\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-client-5.1_5.1.41-3ubuntu12.7_i386.deb\r\n Size/MD5: 8140854 b6c531dc0a508028fb6750a8a97cffed\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-client-core-5.1_5.1.41-3ubuntu12.7_i386.deb\r\n Size/MD5: 178016 4152e6d2a6f2e0691747dc720884bd1a\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-server-5.1_5.1.41-3ubuntu12.7_i386.deb\r\n Size/MD5: 7008926 651a698609fd23d35042d1cc2944a3b8\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.1/mysql-server-core-5.1_5.1.41-3ubuntu12.7_i386.deb\r\n Size/MD5: 4713646 8deca71ef1e6e4d069fe83f0e0e753a0\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-5.1/mysql-testsuite_5.1.41-3ubuntu12.7_i386.deb\r\n Size/MD5: 5854620 306063c37c634c072478bbc955ea2100\r\n\r\n armel architecture (ARM Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqlclient-dev_5.1.41-3ubuntu12.7_armel.deb\r\n Size/MD5: 3013290 827ad26ea7fa08bd1e2e3973cdcb75fe\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqlclient16_5.1.41-3ubuntu12.7_armel.deb\r\n Size/MD5: 1815220 9afb671ee13d6ec83393dbc22cfe4157\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqld-dev_5.1.41-3ubuntu12.7_armel.deb\r\n Size/MD5: 5349762 d9cf3ccfaa7c4ca03207df8685ad9208\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqld-pic_5.1.41-3ubuntu12.7_armel.deb\r\n Size/MD5: 4167498 5712428d809e5692ea97ddc22f072144\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-client-5.1_5.1.41-3ubuntu12.7_armel.deb\r\n Size/MD5: 7839032 9d3fb4fa4abd37cab1492d64f9ff73fa\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-client-core-5.1_5.1.41-3ubuntu12.7_armel.deb\r\n Size/MD5: 176658 31e661ab1a3cc8a7cf6e4aeb3c7d0dcb\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-server-5.1_5.1.41-3ubuntu12.7_armel.deb\r\n Size/MD5: 6649318 7c9cb70f88945f1315c02c54582d0e38\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-server-core-5.1_5.1.41-3ubuntu12.7_armel.deb\r\n Size/MD5: 4527384 ef5b51c9cbe92a4cc044d13bd9de8fc2\r\n http://ports.ubuntu.com/pool/universe/m/mysql-dfsg-5.1/mysql-testsuite_5.1.41-3ubuntu12.7_armel.deb\r\n Size/MD5: 6123626 e2a83e6c0139446b80c086243dda73e4\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqlclient-dev_5.1.41-3ubuntu12.7_powerpc.deb\r\n Size/MD5: 3222050 67e6f36948e272fad3fd2d984bd8de80\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqlclient16_5.1.41-3ubuntu12.7_powerpc.deb\r\n Size/MD5: 1962756 89727e949e4abc8ee7a4e2ae3546d0e8\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqld-dev_5.1.41-3ubuntu12.7_powerpc.deb\r\n Size/MD5: 5679618 7a0a4f87f4c6db95bc4635d68540b3a4\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/libmysqld-pic_5.1.41-3ubuntu12.7_powerpc.deb\r\n Size/MD5: 4399862 ce16555ac32b7437de2d4253cf69707b\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-client-5.1_5.1.41-3ubuntu12.7_powerpc.deb\r\n Size/MD5: 8611942 24293d5d3cf3d07d4dd7465207c5b37d\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-client-core-5.1_5.1.41-3ubuntu12.7_powerpc.deb\r\n Size/MD5: 184446 0ecb05e0b85af24205b1fb6dd8cda569\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-server-5.1_5.1.41-3ubuntu12.7_powerpc.deb\r\n Size/MD5: 7078860 9244d73aacc4dcc086405badab3f4dc9\r\n http://ports.ubuntu.com/pool/main/m/mysql-dfsg-5.1/mysql-server-core-5.1_5.1.41-3ubuntu12.7_powerpc.deb\r\n Size/MD5: 4925814 36478289c2db2b8719ac6dcdd576cc5c\r\n http://ports.ubuntu.com/pool/universe/m/mysql-dfsg-5.1/mysql-testsuite_5.1.41-3ubuntu12.7_powerpc.deb\r\n Size/MD5: 5855794 c3a975ca6f89b5993caac46c2145abc9\r\n\r\nUpdated packages for Ubuntu 10.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-5.1_5.1.49-1ubuntu8.1.diff.gz\r\n Size/MD5: 305493 bf1401a668e17d2fe8968b3eb5e972cd\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-5.1_5.1.49-1ubuntu8.1.dsc\r\n Size/MD5: 2515 8ab9c7f2d21ffb997084059c810c5fdf\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-5.1_5.1.49.orig.tar.gz\r\n Size/MD5: 23687599 a90d87a71fa3c23dff6d78afc8e3184c\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/libmysqlclient16-dev_5.1.49-1ubuntu8.1_all.deb\r\n Size/MD5: 60646 5c4d4c5704b346d44d5c7c8067186ebd\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-client_5.1.49-1ubuntu8.1_all.deb\r\n Size/MD5: 60704 95d45d5a1a5752b684daf8baf10d7e13\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-common_5.1.49-1ubuntu8.1_all.deb\r\n Size/MD5: 64190 600cb8fd550ce078dc43e857fa8c44b5\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-server_5.1.49-1ubuntu8.1_all.deb\r\n Size/MD5: 60828 ee67984f242c5dd457bd9922b84584f5\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/libmysqlclient-dev_5.1.49-1ubuntu8.1_amd64.deb\r\n Size/MD5: 3220050 dcd190be3d830c7467df1e7691be244d\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/libmysqlclient16_5.1.49-1ubuntu8.1_amd64.deb\r\n Size/MD5: 1935174 b484f56c341c2dfe333251310eca9d05\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/libmysqld-dev_5.1.49-1ubuntu8.1_amd64.deb\r\n Size/MD5: 5719086 a3485ac465903beb15c2637be8600dd2\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/libmysqld-pic_5.1.49-1ubuntu8.1_amd64.deb\r\n Size/MD5: 4471496 1a5764de1b2fee475fcd25ff60ae9f2e\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-client-5.1_5.1.49-1ubuntu8.1_amd64.deb\r\n Size/MD5: 8671758 da2ab2925e42cd21375afb783af04ad1\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-client-core-5.1_5.1.49-1ubuntu8.1_amd64.deb\r\n Size/MD5: 153814 d1e5075ed246e2dcd1c098464ee5a08f\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-server-5.1_5.1.49-1ubuntu8.1_amd64.deb\r\n Size/MD5: 7080970 1dd0ef80777971812572d116b18d35c0\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-server-core-5.1_5.1.49-1ubuntu8.1_amd64.deb\r\n Size/MD5: 4957194 cb8fd00319578705a7070f53771a8320\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-5.1/mysql-testsuite_5.1.49-1ubuntu8.1_amd64.deb\r\n Size/MD5: 7368730 cc7c4a05da37f2bf1472ae15ca2f714f\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/libmysqlclient-dev_5.1.49-1ubuntu8.1_i386.deb\r\n Size/MD5: 3105726 3004afe76e052d4d5f01516a11f0495b\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/libmysqlclient16_5.1.49-1ubuntu8.1_i386.deb\r\n Size/MD5: 1881264 5de57206e1461e9aa67390233b8b2d82\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/libmysqld-dev_5.1.49-1ubuntu8.1_i386.deb\r\n Size/MD5: 5470154 48cc3113379fec6769668dd9ebcfa50c\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/libmysqld-pic_5.1.49-1ubuntu8.1_i386.deb\r\n Size/MD5: 4241500 a60587a1d9f508946ed32860fa530daa\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-client-5.1_5.1.49-1ubuntu8.1_i386.deb\r\n Size/MD5: 8025360 9a9904a2acd2ac6011ebf6292b20c720\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-client-core-5.1_5.1.49-1ubuntu8.1_i386.deb\r\n Size/MD5: 143678 12c55b61ff1a84aacb25ad2c8b66ba10\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-server-5.1_5.1.49-1ubuntu8.1_i386.deb\r\n Size/MD5: 6968662 14a3a361658f3d01fae0e382b3f5a2d3\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-5.1/mysql-server-core-5.1_5.1.49-1ubuntu8.1_i386.deb\r\n Size/MD5: 4643116 99ca4a15e99da47659b9092a920f99f0\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-5.1/mysql-testsuite_5.1.49-1ubuntu8.1_i386.deb\r\n Size/MD5: 6985638 39ba73f90d9599bc1ae94e8d49f43a62\r\n\r\n armel architecture (ARM Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/libmysqlclient-dev_5.1.49-1ubuntu8.1_armel.deb\r\n Size/MD5: 3218612 f222c6d8d91ba8e92134fc78da7ac628\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/libmysqlclient16_5.1.49-1ubuntu8.1_armel.deb\r\n Size/MD5: 1892262 360b5e68119affa2b521a14f49f0177f\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/libmysqld-dev_5.1.49-1ubuntu8.1_armel.deb\r\n Size/MD5: 5763584 8433af4cdcbd670215ded8c1919b681e\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/libmysqld-pic_5.1.49-1ubuntu8.1_armel.deb\r\n Size/MD5: 4481508 e9d1759385ccee7ac591f27bb98a2d50\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/mysql-client-5.1_5.1.49-1ubuntu8.1_armel.deb\r\n Size/MD5: 8415362 7076122233d2c649598ec4c1a113af1e\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/mysql-client-core-5.1_5.1.49-1ubuntu8.1_armel.deb\r\n Size/MD5: 147198 e7a41ec8850b5bcfd21826ba30805546\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/mysql-server-5.1_5.1.49-1ubuntu8.1_armel.deb\r\n Size/MD5: 6991658 5673eb309fa0751d71093e4dad432393\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/mysql-server-core-5.1_5.1.49-1ubuntu8.1_armel.deb\r\n Size/MD5: 4829048 6484be204ab8f596969cf62a4fa6f7ec\r\n http://ports.ubuntu.com/pool/universe/m/mysql-5.1/mysql-testsuite_5.1.49-1ubuntu8.1_armel.deb\r\n Size/MD5: 7380590 e96ddf4dd5a7a5569c6814b6dfaea26f\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/libmysqlclient-dev_5.1.49-1ubuntu8.1_powerpc.deb\r\n Size/MD5: 3206172 8a345dc27b2f504ec0ece62bf21a2ff9\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/libmysqlclient16_5.1.49-1ubuntu8.1_powerpc.deb\r\n Size/MD5: 1911892 785ae6e822dc75fafb1bff4b53625692\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/libmysqld-dev_5.1.49-1ubuntu8.1_powerpc.deb\r\n Size/MD5: 5672730 74464f121fa7f900912ad87d434fe286\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/libmysqld-pic_5.1.49-1ubuntu8.1_powerpc.deb\r\n Size/MD5: 4395190 6607c4966d73f6868cc0af0b466133d9\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/mysql-client-5.1_5.1.49-1ubuntu8.1_powerpc.deb\r\n Size/MD5: 8521778 b95cf62dea1e5047ee633336caf1b9a3\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/mysql-client-core-5.1_5.1.49-1ubuntu8.1_powerpc.deb\r\n Size/MD5: 150358 f9b51c4963a90a4955e3daa49a0638ad\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/mysql-server-5.1_5.1.49-1ubuntu8.1_powerpc.deb\r\n Size/MD5: 7036216 bf51324d366812e5e550769e89cd3bbe\r\n http://ports.ubuntu.com/pool/main/m/mysql-5.1/mysql-server-core-5.1_5.1.49-1ubuntu8.1_powerpc.deb\r\n Size/MD5: 4872378 2c557c62dbf828f726dc8ebff63700e8\r\n http://ports.ubuntu.com/pool/universe/m/mysql-5.1/mysql-testsuite_5.1.49-1ubuntu8.1_powerpc.deb\r\n Size/MD5: 6985654 31544cfd6d9944ea6e3c8e9c6d22f84f\r\n\r\n\r\n", "edition": 1, "cvss3": {}, "published": "2010-11-15T00:00:00", "title": "[USN-1017-1] MySQL vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-2008", "CVE-2010-3836", "CVE-2010-3683", "CVE-2010-3677", "CVE-2010-3834", "CVE-2010-3838"], "modified": "2010-11-15T00:00:00", "id": "SECURITYVULNS:DOC:25125", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25125", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2021-06-08T19:06:53", "description": "Unauthrozied ALTER DATABASE / UPGRADE DATA DIRECTORY files access, multiple DoS conditions.", "edition": 2, "cvss3": {}, "published": "2010-11-15T00:00:00", "title": "MySQL multiple security vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2010-3837", "CVE-2010-3680", "CVE-2010-3678", "CVE-2010-3839", "CVE-2010-3835", "CVE-2010-3681", "CVE-2010-3833", "CVE-2010-3840", "CVE-2010-3682", "CVE-2010-3679", "CVE-2010-2008", "CVE-2010-3676", "CVE-2010-3836", "CVE-2010-3683", "CVE-2010-3677", "CVE-2010-3834", "CVE-2010-3838"], "modified": "2010-11-15T00:00:00", "id": "SECURITYVULNS:VULN:11243", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11243", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2021-06-08T19:03:09", "description": "DoS conditions, buffer overflows, information leaks, code execution in different subsystems.", "edition": 2, "cvss3": {}, "published": "2011-07-06T00:00:00", "title": "Apple Mac OS X multiple security vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2010-4651", "CVE-2011-0197", "CVE-2011-0196", "CVE-2010-0740", "CVE-2011-0211", "CVE-2011-0202", "CVE-2011-0199", "CVE-2010-3790", "CVE-2011-0206", "CVE-2011-0204", "CVE-2010-3837", "CVE-2011-0719", "CVE-2011-0201", "CVE-2010-2632", "CVE-2010-3835", "CVE-2011-0210", "CVE-2011-1132", "CVE-2010-3833", "CVE-2010-4180", "CVE-2011-0208", "CVE-2011-0203", "CVE-2011-0212", "CVE-2009-3245", "CVE-2011-0213", "CVE-2011-0014", "CVE-2010-3682", "CVE-2010-3836", "CVE-2011-0195", "CVE-2010-3677", "CVE-2011-0715", "CVE-2010-3834", "CVE-2011-0200", "CVE-2010-3838", "CVE-2011-0205", "CVE-2010-3864", "CVE-2011-0198", "CVE-2011-0209", "CVE-2011-0207", "CVE-2010-3069"], "modified": "2011-07-06T00:00:00", "id": "SECURITYVULNS:VULN:11754", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11754", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:41", "description": "About the security content of Mac OS X v10.6.8 and Security Update 2011-004\r\n\r\n Last Modified: June 23, 2011\r\n Article: HT4723\r\n\r\nEmail this article\r\nPrint this page\r\nSummary\r\n\r\nThis document describes of Mac OS X v10.6.8 and Security Update 2011-004, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.\r\n\r\nFor the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.\r\n\r\nFor information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."\r\n\r\nWhere possible, CVE IDs are used to reference the vulnerabilities for further information.\r\n\r\nTo learn about other Security Updates, see "Apple Security Updates."\r\nProducts Affected\r\n\r\nMac OS X 10.6, Product Security\r\nMac OS X v10.6.8 and Security Update 2011-004\r\n\r\n AirPort\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8\r\n\r\n Impact: When connected to Wi-Fi, an attacker on the same network may be able to cause a system reset\r\n\r\n Description: An out of bounds memory read issue existed in the handling of Wi-Fi frames. When connected to Wi-Fi, an attacker on the same network may be able to cause a system reset. This issue does not affect Mac OS X v10.6\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0196\r\n\r\n App Store\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: The user's AppleID password may be logged to a local file\r\n\r\n Description: In certain circumstances, App Store may log the user's AppleID password to a file that is not readable by other users on the system. This issue is addressed through improved handling of credentials.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0197 : Paul Nelson\r\n\r\n ATS\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution\r\n\r\n Description: A heap buffer overflow issue existed in the handling of TrueType fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0198 : Harry Sintonen, Marc Schoenefeld of the Red Hat Security Response Team\r\n\r\n Certificate Trust Policy\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information\r\n\r\n Description: An error handling issue existed in the Certificate Trust Policy. If an Extended Validation (EV) certificate has no OCSP URL, and CRL checking is enabled, the CRL will not be checked and a revoked certificate may be accepted as valid. This issue is mitigated as most EV certificates specify an OCSP URL.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0199 : Chris Hawk and Wan-Teh Chang of Google\r\n\r\n ColorSync\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8\r\n\r\n Impact: Viewing a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer overflow existed in the handling of images with an embedded ColorSync profile, which may lead to a heap buffer overflow. Opening a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0200 : binaryproof working with TippingPoint's Zero Day Initiative\r\n\r\n CoreFoundation\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Applications that use the CoreFoundation framework may be vulnerable to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An off-by-one buffer overflow issue existed in the handling of CFStrings. Applications that use the CoreFoundation framework may be vulnerable to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0201 : Harry Sintonen\r\n\r\n CoreGraphics\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer overflow issue existed in the handling of Type 1 fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0202 : Cristian Draghici of Modulo Consulting, Felix Grobert of the Google Security Team\r\n\r\n FTP Server\r\n\r\n Available for: Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: A person with FTP access may list files on the system\r\n\r\n Description: A path validation issue existed in xftpd. A person with FTP access may perform a recursive directory listing starting from the root, including directories that are not shared for FTP. The listing will eventually include any file that would be accessible to the FTP user. The contents of files are not disclosed. This issue is addressed through improved path validation. This issue only affects Mac OS X Server systems.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0203 : team karlkani\r\n\r\n ImageIO\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A heap buffer overflow existed in ImageIO's handling of TIFF images. Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0204 : Dominic Chell of NGS Secure\r\n\r\n ImageIO\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A heap buffer overflow issue existed in ImageIO's handling of JPEG2000 images. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0205 : Harry Sintonen\r\n\r\n International Components for Unicode\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Applications that use ICU may be vulnerable to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A buffer overflow issue existed in ICU's handling of uppercase strings. Applications that use ICU may be vulnerable to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0206 : David Bienvenu of Mozilla\r\n\r\n Kernel\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: A local user may be able to cause a system reset\r\n\r\n Description: A null dereference issue existed in the handling of IPV6 socket options. A local user may be able to cause a system reset.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-1132 : Thomas Clement of Intego\r\n\r\n Libsystem\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Applications which use the glob(3) API may be vulnerable to a denial of service\r\n\r\n Description: Applications which use the glob(3) API may be vulnerable to a denial of service. If the glob pattern comes from untrusted input, the application may hang or use excessive CPU resources. This issue is addressed through improved validation of glob patterns.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-2632 : Maksymilian Arciemowicz\r\n\r\n libxslt\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Visiting a maliciously crafted website may lead to the disclosure of addresses on the heap\r\n\r\n Description: libxslt's implementation of the generate-id() XPath function disclosed the address of a heap buffer. Visiting a maliciously crafted website may lead to the disclosure of addresses on the heap. This issue is addressed by generating an ID based on the difference between the addresses of two heap buffers.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0195 : Chris Evans of the Google Chrome Security Team\r\n\r\n MobileMe\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: An attacker with a privileged network position may read a user's MobileMe email aliases\r\n\r\n Description: When communicating with MobileMe to determine a user's email aliases, Mail will make requests over HTTP. As a result, an attacker with a privileged network position may read a user's MobileMe email aliases. This issue is addressed by using SSL to access the user's email aliases.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0207 : Aaron Sigel of vtty.com\r\n\r\n MySQL\r\n\r\n Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Multiple vulnerabilities in MySQL 5.0.91\r\n\r\n Description: MySQL is updated to version 5.0.92 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. MySQL is only provided with Mac OS X Server systems. Further information is available via the MySQL web site at http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3677\r\n\r\n CVE-2010-3682\r\n\r\n CVE-2010-3833\r\n\r\n CVE-2010-3834\r\n\r\n CVE-2010-3835\r\n\r\n CVE-2010-3836\r\n\r\n CVE-2010-3837\r\n\r\n CVE-2010-3838\r\n\r\n OpenSSL\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Multiple vulnerabilities in OpenSSL\r\n\r\n Description: Multiple vulnerabilities existed in OpenSSL, the most serious of which may lead to arbitrary code execution. These issues are addressed by updating OpenSSL to version 0.9.8r.\r\n\r\n CVE-ID\r\n\r\n CVE-2009-3245\r\n\r\n CVE-2010-0740\r\n\r\n CVE-2010-3864\r\n\r\n CVE-2010-4180\r\n\r\n CVE-2011-0014\r\n\r\n patch\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Running patch on a maliciously crafted patch file may cause arbitrary files to be created or overwritten\r\n\r\n Description: A directory traversal issue existed in GNU patch. Running patch on a maliciously crafted patch file may cause arbitrary files to be created or overwritten. This issue is addressed through improved validation of patch files.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-4651\r\n\r\n QuickLook\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in QuickLook's handling of Microsoft Office files. Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0208 : Tobias Klein working with iDefense VCP\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Viewing a maliciously crafted WAV file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer overflow existed in QuickTime's handling of RIFF WAV files. Viewing a maliciously crafted WAV file may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0209 : Luigi Auriemma working with TippingPoint's Zero Day Initiative\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in QuickTime's handling of sample tables in QuickTime movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0210 : Honggang Ren of Fortinet's FortiGuard Labs\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer overflow existed in QuickTime's handling of movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0211 : Luigi Auriemma working with TippingPoint's Zero Day Initiative\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Viewing a maliciously crafted PICT image may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A buffer overflow existed in QuickTime's handling of PICT images. Viewing a maliciously crafted PICT image may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3790 : Subreption LLC working with TippingPoint's Zero Day Initiative\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: Viewing a maliciously crafted JPEG file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A buffer overflow existed in QuickTime's handling of JPEG files. Viewing a maliciously crafted JPEG file may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0213 : Luigi Auriemma working with iDefense\r\n\r\n Samba\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8\r\n\r\n Impact: If SMB file sharing is enabled, a remote attacker may cause a denial of service or arbitrary code execution\r\n\r\n Description: A stack buffer overflow existed in Samba's handling of Windows Security IDs. If SMB file sharing is enabled, a remote attacker may cause a denial of service or arbitrary code execution. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X 10.6.7.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3069\r\n\r\n Samba\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: If SMB file sharing is enabled, a remote attacker may cause a denial of service or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in Samba's handling of file descriptors. If SMB file sharing is enabled, a remote attacker may cause a denial of service or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0719 : Volker Lendecke of SerNet\r\n\r\n servermgrd\r\n\r\n Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: A remote attacker may be able to read arbitrary files from the system\r\n\r\n Description: An XML External Entity issue exists in servermgrd's handling of XML-RPC requests. This issue is addressed by removing servermgrd's XML-RPC interface. This issue only affects Mac OS X Server systems.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0212 : Apple\r\n\r\n subversion\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.7, Mac OS X Server v10.6 through v10.6.7\r\n\r\n Impact: If an http based Subversion server is configured, a remote attacker may be able to cause a denial of service\r\n\r\n Description: A null dereference issue existed in Subversion's handling of lock tokens sent over HTTP. If an http based Subversion server is configured, a remote attacker may be able to cause a denial of service. For Mac OS X v10.6 systems, Subversion is updated to version 1.6.6. For Mac OS X v10.5.8 systems, the issue is addressed through additional validation of lock tokens. Further information is available via the Subversion web site at http://subversion.tigris.org/\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0715\r\n\r\n", "edition": 1, "cvss3": {}, "published": "2011-07-04T00:00:00", "title": "About the security content of Mac OS X v10.6.8 and Security Update 2011-004", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2010-4651", "CVE-2011-0197", "CVE-2011-0196", "CVE-2010-0740", "CVE-2011-0211", "CVE-2011-0202", "CVE-2011-0199", "CVE-2010-3790", "CVE-2011-0206", "CVE-2011-0204", "CVE-2010-3837", "CVE-2011-0719", "CVE-2011-0201", "CVE-2010-2632", "CVE-2010-3835", "CVE-2011-0210", "CVE-2011-1132", "CVE-2010-3833", "CVE-2010-4180", "CVE-2011-0208", "CVE-2011-0203", "CVE-2011-0212", "CVE-2009-3245", "CVE-2011-0213", "CVE-2011-0014", "CVE-2010-3682", "CVE-2010-3836", "CVE-2011-0195", "CVE-2010-3677", "CVE-2011-0715", "CVE-2010-3834", "CVE-2011-0200", "CVE-2010-3838", "CVE-2011-0205", "CVE-2010-3864", "CVE-2011-0198", "CVE-2011-0209", "CVE-2011-0207", "CVE-2010-3069"], "modified": "2011-07-04T00:00:00", "id": "SECURITYVULNS:DOC:26596", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:26596", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "debian": [{"lastseen": "2021-11-30T00:03:09", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2143-1 security@debian.org\nhttp://www.debian.org/security/ Giuseppe Iuculano\nJanuary 14, 2011 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : mysql-dfsg-5.0\nVulnerability : several vulnerabilities\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2010-3677 CVE-2010-3680 CVE-2010-3681 CVE-2010-3682 CVE-2010-3833 CVE-2010-3834 CVE-2010-3835 CVE-2010-3836 CVE-2010-3837 CVE-2010-3838 CVE-2010-3840\n\n\nSeveral vulnerabilities have been discovered in the MySQL\ndatabase server.\nThe Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\n\nCVE-2010-3677\n\n It was discovered that MySQL allows remote authenticated users to cause\n a denial of service (mysqld daemon crash) via a join query that uses a\n table with a unique SET column.\n\n\nCVE-2010-3680\n\n It was discovered that MySQL allows remote authenticated users to cause\n a denial of service (mysqld daemon crash) by creating temporary tables\n while using InnoDB, which triggers an assertion failure.\n\n\nCVE-2010-3681\n\n It was discovered that MySQL allows remote authenticated users to cause\n a denial of service (mysqld daemon crash) by using the HANDLER interface\n and performing "alternate reads from two indexes on a table," which\n triggers an assertion failure.\n\n\nCVE-2010-3682\n\n It was discovered that MySQL incorrectly handled use of EXPLAIN with\n certain queries.\n An authenticated user could crash the server.\n\n\nCVE-2010-3833\n\n It was discovered that MySQL incorrectly handled propagation during\n evaluation of arguments to extreme-value functions.\n An authenticated user could crash the server.\n\n\nCVE-2010-3834\n\n It was discovered that MySQL incorrectly handled materializing a derived\n table that required a temporary table for grouping.\n An authenticated user could crash the server.\n\n\nCVE-2010-3835\n\n It was discovered that MySQL incorrectly handled certain user-variable\n assignment expressions that are evaluated in a logical expression context.\n An authenticated user could crash the server.\n\n\nCVE-2010-3836\n\n It was discovered that MySQL incorrectly handled pre-evaluation of LIKE\n predicates during view preparation.\n An authenticated user could crash the server.\n\n\nCVE-2010-3837\n\n It was discovered that MySQL incorrectly handled using GROUP_CONCAT()\n and WITH ROLLUP together.\n An authenticated user could crash the server.\n\n\nCVE-2010-3838\n\n It was discovered that MySQL incorrectly handled certain queries using a\n mixed list of numeric and LONGBLOB arguments to the GREATEST() or\n LEAST() functions.\n An authenticated user could crash the server.\n\n\nCVE-2010-3840\n\n It was discovered that MySQL incorrectly handled improper WKB data\n passed to the PolyFromWKB() function.\n An authenticated user could crash the server.\n\n\nFor the stable distribution (lenny), these problems have been fixed\nin version 5.0.51a-24+lenny5\n\nThe testing (squeeze) and unstable (sid) distribution do not contain\nmysql-dfsg-5.0 anymore.\n\nWe recommend that you upgrade your mysql-dfsg-5.0 packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2011-01-14T09:07:22", "type": "debian", "title": "[SECURITY] [DSA-2143-1] New mysql-dfsg-5.0 packages fix several vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3677", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3834", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3840"], "modified": "2011-01-14T09:07:22", "id": "DEBIAN:DSA-2143-1:3EA54", "href": "https://lists.debian.org/debian-security-announce/2011/msg00007.html", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-10-22T00:29:08", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2143-1 security@debian.org\nhttp://www.debian.org/security/ Giuseppe Iuculano\nJanuary 14, 2011 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : mysql-dfsg-5.0\nVulnerability : several vulnerabilities\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2010-3677 CVE-2010-3680 CVE-2010-3681 CVE-2010-3682 CVE-2010-3833 CVE-2010-3834 CVE-2010-3835 CVE-2010-3836 CVE-2010-3837 CVE-2010-3838 CVE-2010-3840\n\n\nSeveral vulnerabilities have been discovered in the MySQL\ndatabase server.\nThe Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\n\nCVE-2010-3677\n\n It was discovered that MySQL allows remote authenticated users to cause\n a denial of service (mysqld daemon crash) via a join query that uses a\n table with a unique SET column.\n\n\nCVE-2010-3680\n\n It was discovered that MySQL allows remote authenticated users to cause\n a denial of service (mysqld daemon crash) by creating temporary tables\n while using InnoDB, which triggers an assertion failure.\n\n\nCVE-2010-3681\n\n It was discovered that MySQL allows remote authenticated users to cause\n a denial of service (mysqld daemon crash) by using the HANDLER interface\n and performing "alternate reads from two indexes on a table," which\n triggers an assertion failure.\n\n\nCVE-2010-3682\n\n It was discovered that MySQL incorrectly handled use of EXPLAIN with\n certain queries.\n An authenticated user could crash the server.\n\n\nCVE-2010-3833\n\n It was discovered that MySQL incorrectly handled propagation during\n evaluation of arguments to extreme-value functions.\n An authenticated user could crash the server.\n\n\nCVE-2010-3834\n\n It was discovered that MySQL incorrectly handled materializing a derived\n table that required a temporary table for grouping.\n An authenticated user could crash the server.\n\n\nCVE-2010-3835\n\n It was discovered that MySQL incorrectly handled certain user-variable\n assignment expressions that are evaluated in a logical expression context.\n An authenticated user could crash the server.\n\n\nCVE-2010-3836\n\n It was discovered that MySQL incorrectly handled pre-evaluation of LIKE\n predicates during view preparation.\n An authenticated user could crash the server.\n\n\nCVE-2010-3837\n\n It was discovered that MySQL incorrectly handled using GROUP_CONCAT()\n and WITH ROLLUP together.\n An authenticated user could crash the server.\n\n\nCVE-2010-3838\n\n It was discovered that MySQL incorrectly handled certain queries using a\n mixed list of numeric and LONGBLOB arguments to the GREATEST() or\n LEAST() functions.\n An authenticated user could crash the server.\n\n\nCVE-2010-3840\n\n It was discovered that MySQL incorrectly handled improper WKB data\n passed to the PolyFromWKB() function.\n An authenticated user could crash the server.\n\n\nFor the stable distribution (lenny), these problems have been fixed\nin version 5.0.51a-24+lenny5\n\nThe testing (squeeze) and unstable (sid) distribution do not contain\nmysql-dfsg-5.0 anymore.\n\nWe recommend that you upgrade your mysql-dfsg-5.0 packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2011-01-14T09:07:22", "type": "debian", "title": "[SECURITY] [DSA-2143-1] New mysql-dfsg-5.0 packages fix several vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3677", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3834", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3840"], "modified": "2011-01-14T09:07:22", "id": "DEBIAN:DSA-2143-1:90CDB", "href": "https://lists.debian.org/debian-security-announce/2011/msg00007.html", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "centos": [{"lastseen": "2022-02-27T11:57:34", "description": "**CentOS Errata and Security Advisory** CESA-2010:0825\n\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists of\nthe MySQL server daemon (mysqld) and many client programs and libraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity check\nWell-Known Binary (WKB) data. A remote, authenticated attacker could use\nspecially-crafted WKB data to crash mysqld. This issue only caused a\ntemporary denial of service, as mysqld was automatically restarted after\nthe crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain JOIN queries. If a\nstored procedure contained JOIN queries, and that procedure was executed\ntwice in sequence, it could cause an infinite loop, leading to excessive\nCPU use (up to 100%). A remote, authenticated attacker could use this flaw\nto cause a denial of service. (CVE-2010-3839)\n\nA flaw was found in the way MySQL processed queries that provide a mixture\nof numeric and longblob data types to the LEAST or GREATEST function. A\nremote, authenticated attacker could use this flaw to crash mysqld. This\nissue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2010-3838)\n\nA flaw was found in the way MySQL processed PREPARE statements containing\nboth GROUP_CONCAT and the WITH ROLLUP modifier. A remote, authenticated\nattacker could use this flaw to crash mysqld. This issue only caused a\ntemporary denial of service, as mysqld was automatically restarted after\nthe crash. (CVE-2010-3837)\n\nIt was found that MySQL did not properly pre-evaluate LIKE arguments in\nview prepare mode. A remote, authenticated attacker could possibly use this\nflaw to crash mysqld. (CVE-2010-3836)\n\nA flaw was found in the way MySQL processed statements that assign a value\nto a user-defined variable and that also contain a logical value\nevaluation. A remote, authenticated attacker could use this flaw to crash\nmysqld. This issue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2010-3835)\n\nA flaw was found in the way MySQL evaluated the arguments of extreme-value\nfunctions, such as LEAST and GREATEST. A remote, authenticated attacker\ncould use this flaw to crash mysqld. This issue only caused a temporary\ndenial of service, as mysqld was automatically restarted after the crash.\n(CVE-2010-3833)\n\nA flaw was found in the way MySQL processed EXPLAIN statements for some\ncomplex SELECT queries. A remote, authenticated attacker could use this\nflaw to crash mysqld. This issue only caused a temporary denial of service,\nas mysqld was automatically restarted after the crash. (CVE-2010-3682)\n\nA flaw was found in the way MySQL processed certain alternating READ\nrequests provided by HANDLER statements. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash. This\nissue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2010-3681)\n\nA flaw was found in the way MySQL processed CREATE TEMPORARY TABLE\nstatements that define NULL columns when using the InnoDB storage engine. A\nremote, authenticated attacker could use this flaw to crash mysqld. This\nissue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2010-3680)\n\nA flaw was found in the way MySQL processed JOIN queries that attempt to\nretrieve data from a unique SET column. A remote, authenticated attacker\ncould use this flaw to crash mysqld. This issue only caused a temporary\ndenial of service, as mysqld was automatically restarted after the crash.\n(CVE-2010-3677)\n\nAll MySQL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing this\nupdate, the MySQL server daemon (mysqld) will be restarted automatically.\n\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2010-November/054063.html\nhttps://lists.centos.org/pipermail/centos-announce/2010-November/054064.html\n\n**Affected packages:**\nmysql\nmysql-bench\nmysql-devel\nmysql-server\nmysql-test\n\n**Upstream details at:**\nhttps://access.redhat.com/errata/RHSA-2010:0825", "cvss3": {}, "published": "2010-11-05T14:26:35", "type": "centos", "title": "mysql security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3677", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3833", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2010-11-05T14:28:34", "id": "CESA-2010:0825", "href": "https://lists.centos.org/pipermail/centos-announce/2010-November/054063.html", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-02-27T11:57:34", "description": "**CentOS Errata and Security Advisory** CESA-2010:0824\n\n\nMySQL is a multi-user, multi-threaded SQL database server. It consists of\nthe MySQL server daemon (mysqld) and many client programs and libraries.\n\nIt was found that the MySQL PolyFromWKB() function did not sanity check\nWell-Known Binary (WKB) data. A remote, authenticated attacker could use\nspecially-crafted WKB data to crash mysqld. This issue only caused a\ntemporary denial of service, as mysqld was automatically restarted after\nthe crash. (CVE-2010-3840)\n\nA flaw was found in the way MySQL processed certain alternating READ\nrequests provided by HANDLER statements. A remote, authenticated attacker\ncould use this flaw to provide such requests, causing mysqld to crash. This\nissue only caused a temporary denial of service, as mysqld was\nautomatically restarted after the crash. (CVE-2010-3681)\n\nA directory traversal flaw was found in the way MySQL handled the\nparameters of the MySQL COM_FIELD_LIST network protocol command. A remote,\nauthenticated attacker could use this flaw to obtain descriptions of the\nfields of an arbitrary table using a request with a specially-crafted\ntable name. (CVE-2010-1848)\n\nAll MySQL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing this\nupdate, the MySQL server daemon (mysqld) will be restarted automatically.\n\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2010-November/054061.html\nhttps://lists.centos.org/pipermail/centos-announce/2010-November/054062.html\n\n**Affected packages:**\nmysql\nmysql-bench\nmysql-devel\nmysql-server\n\n**Upstream details at:**\nhttps://access.redhat.com/errata/RHSA-2010:0824", "cvss3": {}, "published": "2010-11-05T14:22:54", "type": "centos", "title": "mysql security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1848", "CVE-2010-3681", "CVE-2010-3840"], "modified": "2010-11-05T14:23:42", "id": "CESA-2010:0824", "href": "https://lists.centos.org/pipermail/centos-announce/2010-November/054061.html", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2022-01-17T19:13:19", "description": "### Background\n\nMySQL is a popular open-source multi-threaded, multi-user SQL database server. \n\n### Description\n\nMultiple vulnerabilities have been discovered in MySQL. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nAn unauthenticated remote attacker may be able to execute arbitrary code with the privileges of the MySQL process, cause a Denial of Service condition, bypass security restrictions, uninstall arbitrary MySQL plugins, or conduct Man-in-the-Middle and Cross-Site Scripting attacks. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll MySQL users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-db/mysql-5.1.56\"\n \n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are available since May 14, 2011. It is likely that your system is already no longer affected by this issue.", "cvss3": {}, "published": "2012-01-05T00:00:00", "type": "gentoo", "title": "MySQL: Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 6.8, "obtainAllPrivilege": true, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 8.5, "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-3963", "CVE-2008-4097", "CVE-2008-4098", "CVE-2008-4456", "CVE-2008-7247", "CVE-2009-2446", "CVE-2009-4019", "CVE-2009-4028", "CVE-2009-4484", "CVE-2010-1621", "CVE-2010-1626", "CVE-2010-1848", "CVE-2010-1849", "CVE-2010-1850", "CVE-2010-2008", "CVE-2010-3676", "CVE-2010-3677", "CVE-2010-3678", "CVE-2010-3679", "CVE-2010-3680", "CVE-2010-3681", "CVE-2010-3682", "CVE-2010-3683", "CVE-2010-3833", "CVE-2010-3834", "CVE-2010-3835", "CVE-2010-3836", "CVE-2010-3837", "CVE-2010-3838", "CVE-2010-3839", "CVE-2010-3840"], "modified": "2012-01-05T00:00:00", "id": "GLSA-201201-02", "href": "https://security.gentoo.org/glsa/201201-02", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2022-05-14T13:59:23", "description": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier.", "cvss3": {}, "published": "2011-01-11T20:00:00", "type": "cve", "title": "CVE-2010-3678", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3678"], "modified": "2019-12-17T20:23:00", "cpe": ["cpe:/a:oracle:mysql:5.1.44", "cpe:/a:oracle:mysql:5.1.38", "cpe:/a:oracle:mysql:5.1.45", "cpe:/a:oracle:mysql:5.1.27", "cpe:/a:oracle:mysql:5.1.36", "cpe:/a:oracle:mysql:5.1.7", "cpe:/a:oracle:mysql:5.1.6", "cpe:/a:oracle:mysql:5.1.34", "cpe:/a:oracle:mysql:5.1.30", "cpe:/a:oracle:mysql:5.1.41", "cpe:/a:mysql:mysql:5.1.37", "cpe:/a:oracle:mysql:5.1.4", "cpe:/a:oracle:mysql:5.1.24", "cpe:/a:oracle:mysql:5.1.1", "cpe:/a:mysql:mysql:5.1.5", "cpe:/a:mysql:mysql:5.1.34", "cpe:/a:oracle:mysql:5.1.17", "cpe:/a:oracle:mysql:5.1.28", "cpe:/a:oracle:mysql:5.1.21", "cpe:/a:oracle:mysql:5.1.14", "cpe:/a:oracle:mysql:5.1.10", "cpe:/a:oracle:mysql:5.1.29", "cpe:/a:mysql:mysql:5.1.23", "cpe:/a:oracle:mysql:5.1.11", "cpe:/a:oracle:mysql:5.1.9", "cpe:/a:oracle:mysql:5.1.16", "cpe:/a:mysql:mysql:5.1.32", "cpe:/a:oracle:mysql:5.1.47", "cpe:/a:oracle:mysql:5.1", "cpe:/a:oracle:mysql:5.1.43", "cpe:/a:oracle:mysql:5.1.13", "cpe:/a:oracle:mysql:5.1.37", "cpe:/a:oracle:mysql:5.1.48", "cpe:/a:oracle:mysql:5.1.20", "cpe:/a:oracle:mysql:5.1.46", "cpe:/a:oracle:mysql:5.1.2", "cpe:/a:oracle:mysql:5.1.18", "cpe:/a:oracle:mysql:5.1.33", "cpe:/a:oracle:mysql:5.1.23", "cpe:/a:mysql:mysql:5.1.31", "cpe:/a:oracle:mysql:5.1.8", "cpe:/a:oracle:mysql:5.1.40", "cpe:/a:oracle:mysql:5.1.42", "cpe:/a:oracle:mysql:5.1.26", "cpe:/a:oracle:mysql:5.1.25", "cpe:/a:oracle:mysql:5.1.19", "cpe:/a:oracle:mysql:5.1.12", "cpe:/a:oracle:mysql:5.1.31", "cpe:/a:oracle:mysql:5.1.39", "cpe:/a:oracle:mysql:5.1.3", "cpe:/a:oracle:mysql:5.1.22", "cpe:/a:oracle:mysql:5.1.35", "cpe:/a:oracle:mysql:5.1.15"], "id": "CVE-2010-3678", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3678", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*"]}, {"lastseen": "2022-05-14T13:59:27", "description": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request.", "cvss3": {}, "published": "2011-01-11T20:00:00", "type": "cve", "title": "CVE-2010-3683", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3683"], "modified": "2019-12-17T20:23:00", "cpe": ["cpe:/a:oracle:mysql:5.1.44", "cpe:/a:oracle:mysql:5.1.38", "cpe:/a:oracle:mysql:5.5.2", "cpe:/a:oracle:mysql:5.1.45", "cpe:/a:oracle:mysql:5.1.27", "cpe:/a:oracle:mysql:5.1.36", "cpe:/a:oracle:mysql:5.1.7", "cpe:/a:oracle:mysql:5.5.4", "cpe:/a:oracle:mysql:5.1.6", "cpe:/a:oracle:mysql:5.1.34", "cpe:/a:oracle:mysql:5.1.30", "cpe:/a:oracle:mysql:5.1.41", "cpe:/a:mysql:mysql:5.1.37", "cpe:/a:oracle:mysql:5.1.4", "cpe:/a:oracle:mysql:5.1.24", "cpe:/a:oracle:mysql:5.1.1", "cpe:/a:mysql:mysql:5.1.5", "cpe:/a:mysql:mysql:5.1.34", "cpe:/a:oracle:mysql:5.1.17", "cpe:/a:oracle:mysql:5.1.21", "cpe:/a:oracle:mysql:5.1.28", "cpe:/a:oracle:mysql:5.1.14", "cpe:/a:oracle:mysql:5.5.0", "cpe:/a:oracle:mysql:5.1.10", "cpe:/a:oracle:mysql:5.1.29", "cpe:/a:mysql:mysql:5.1.23", "cpe:/a:oracle:mysql:5.1.11", "cpe:/a:oracle:mysql:5.1.9", "cpe:/a:oracle:mysql:5.1.16", "cpe:/a:mysql:mysql:5.1.32", "cpe:/a:oracle:mysql:5.1.47", "cpe:/a:oracle:mysql:5.1", "cpe:/a:oracle:mysql:5.1.43", "cpe:/a:oracle:mysql:5.1.13", "cpe:/a:oracle:mysql:5.1.37", "cpe:/a:oracle:mysql:5.1.48", "cpe:/a:oracle:mysql:5.1.20", "cpe:/a:oracle:mysql:5.1.46", "cpe:/a:oracle:mysql:5.1.2", "cpe:/a:oracle:mysql:5.1.18", "cpe:/a:oracle:mysql:5.1.33", "cpe:/a:oracle:mysql:5.1.23", "cpe:/a:oracle:mysql:5.5.1", "cpe:/a:mysql:mysql:5.1.31", "cpe:/a:oracle:mysql:5.1.8", "cpe:/a:oracle:mysql:5.1.40", "cpe:/a:oracle:mysql:5.1.42", "cpe:/a:oracle:mysql:5.1.19", "cpe:/a:oracle:mysql:5.1.26", "cpe:/a:oracle:mysql:5.1.25", "cpe:/a:oracle:mysql:5.1.12", "cpe:/a:oracle:mysql:5.1.31", "cpe:/a:oracle:mysql:5.5.3", "cpe:/a:oracle:mysql:5.1.39", "cpe:/a:oracle:mysql:5.1.3", "cpe:/a:oracle:mysql:5.1.22", "cpe:/a:oracle:mysql:5.1.35", "cpe:/a:oracle:mysql:5.1.15"], "id": "CVE-2010-3683", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3683", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*"]}, {"lastseen": "2022-05-14T13:59:22", "description": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables with nullable columns while using InnoDB, which triggers an assertion failure.", "cvss3": {}, "published": "2011-01-11T20:00:00", "type": "cve", "title": "CVE-2010-3680", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3680"], "modified": "2019-12-17T20:23:00", "cpe": ["cpe:/a:oracle:mysql:5.1.44", "cpe:/a:oracle:mysql:5.1.38", "cpe:/a:oracle:mysql:5.1.45", "cpe:/a:oracle:mysql:5.1.27", "cpe:/a:oracle:mysql:5.1.36", "cpe:/a:oracle:mysql:5.1.7", "cpe:/a:oracle:mysql:5.1.6", "cpe:/a:oracle:mysql:5.1.34", "cpe:/a:oracle:mysql:5.1.30", "cpe:/a:oracle:mysql:5.1.41", "cpe:/a:mysql:mysql:5.1.37", "cpe:/a:oracle:mysql:5.1.4", "cpe:/a:oracle:mysql:5.1.24", "cpe:/a:oracle:mysql:5.1.1", "cpe:/a:mysql:mysql:5.1.5", "cpe:/a:mysql:mysql:5.1.34", "cpe:/a:oracle:mysql:5.1.17", "cpe:/a:oracle:mysql:5.1.21", "cpe:/a:oracle:mysql:5.1.28", "cpe:/a:oracle:mysql:5.1.14", "cpe:/a:oracle:mysql:5.1.10", "cpe:/a:oracle:mysql:5.1.29", "cpe:/a:mysql:mysql:5.1.23", "cpe:/a:oracle:mysql:5.1.11", "cpe:/a:oracle:mysql:5.1.9", "cpe:/a:oracle:mysql:5.1.16", "cpe:/a:mysql:mysql:5.1.32", "cpe:/a:oracle:mysql:5.1.47", "cpe:/a:oracle:mysql:5.1", "cpe:/a:oracle:mysql:5.1.43", "cpe:/a:oracle:mysql:5.1.13", "cpe:/a:oracle:mysql:5.1.37", "cpe:/a:oracle:mysql:5.1.48", "cpe:/a:oracle:mysql:5.1.20", "cpe:/a:oracle:mysql:5.1.46", "cpe:/a:oracle:mysql:5.1.2", "cpe:/a:oracle:mysql:5.1.18", "cpe:/a:oracle:mysql:5.1.33", "cpe:/a:oracle:mysql:5.1.23", "cpe:/a:mysql:mysql:5.1.31", "cpe:/a:oracle:mysql:5.1.8", "cpe:/a:oracle:mysql:5.1.40", "cpe:/a:oracle:mysql:5.1.42", "cpe:/a:oracle:mysql:5.1.19", "cpe:/a:oracle:mysql:5.1.26", "cpe:/a:oracle:mysql:5.1.25", "cpe:/a:oracle:mysql:5.1.12", "cpe:/a:oracle:mysql:5.1.31", "cpe:/a:oracle:mysql:5.1.39", "cpe:/a:oracle:mysql:5.1.3", "cpe:/a:oracle:mysql:5.1.22", "cpe:/a:oracle:mysql:5.1.35", "cpe:/a:oracle:mysql:5.1.15"], "id": "CVE-2010-3680", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3680", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*"]}, {"lastseen": "2022-05-14T13:59:23", "description": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing \"alternate reads from two indexes on a table,\" which triggers an assertion failure.", "cvss3": {}, "published": "2011-01-11T20:00:00", "type": "cve", "title": "CVE-2010-3681", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3681"], "modified": "2019-12-17T20:23:00", "cpe": ["cpe:/a:oracle:mysql:5.1.44", "cpe:/a:oracle:mysql:5.1.38", "cpe:/a:oracle:mysql:5.5.2", "cpe:/a:oracle:mysql:5.1.45", "cpe:/a:oracle:mysql:5.1.27", "cpe:/a:oracle:mysql:5.1.36", "cpe:/a:oracle:mysql:5.1.7", "cpe:/a:oracle:mysql:5.5.4", "cpe:/a:oracle:mysql:5.1.6", "cpe:/a:oracle:mysql:5.1.34", "cpe:/a:oracle:mysql:5.1.30", "cpe:/a:oracle:mysql:5.1.41", "cpe:/a:mysql:mysql:5.1.37", "cpe:/a:oracle:mysql:5.1.4", "cpe:/a:oracle:mysql:5.1.24", "cpe:/a:oracle:mysql:5.1.1", "cpe:/a:mysql:mysql:5.1.5", "cpe:/a:mysql:mysql:5.1.34", "cpe:/a:oracle:mysql:5.1.17", "cpe:/a:oracle:mysql:5.1.28", "cpe:/a:oracle:mysql:5.1.21", "cpe:/a:oracle:mysql:5.1.14", "cpe:/a:oracle:mysql:5.5.0", "cpe:/a:oracle:mysql:5.1.10", "cpe:/a:oracle:mysql:5.1.29", "cpe:/a:mysql:mysql:5.1.23", "cpe:/a:oracle:mysql:5.1.11", "cpe:/a:oracle:mysql:5.1.9", "cpe:/a:oracle:mysql:5.1.16", "cpe:/a:mysql:mysql:5.1.32", "cpe:/a:oracle:mysql:5.1.47", "cpe:/a:oracle:mysql:5.1", "cpe:/a:oracle:mysql:5.1.43", "cpe:/a:oracle:mysql:5.1.13", "cpe:/a:oracle:mysql:5.1.37", "cpe:/a:oracle:mysql:5.1.48", "cpe:/a:oracle:mysql:5.1.20", "cpe:/a:oracle:mysql:5.1.46", "cpe:/a:oracle:mysql:5.1.2", "cpe:/a:oracle:mysql:5.1.18", "cpe:/a:oracle:mysql:5.1.33", "cpe:/a:oracle:mysql:5.1.23", "cpe:/a:oracle:mysql:5.5.1", "cpe:/a:mysql:mysql:5.1.31", "cpe:/a:oracle:mysql:5.1.8", "cpe:/a:oracle:mysql:5.1.40", "cpe:/a:oracle:mysql:5.1.42", "cpe:/a:oracle:mysql:5.1.19", "cpe:/a:oracle:mysql:5.1.26", "cpe:/a:oracle:mysql:5.1.25", "cpe:/a:oracle:mysql:5.1.12", "cpe:/a:oracle:mysql:5.1.31", "cpe:/a:oracle:mysql:5.5.3", "cpe:/a:oracle:mysql:5.1.39", "cpe:/a:oracle:mysql:5.1.3", "cpe:/a:oracle:mysql:5.1.22", "cpe:/a:oracle:mysql:5.1.35", "cpe:/a:oracle:mysql:5.1.15"], "id": "CVE-2010-3681", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3681", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*"]}, {"lastseen": "2022-05-14T13:59:24", "description": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.", "cvss3": {}, "published": "2011-01-11T20:00:00", "type": "cve", "title": "CVE-2010-3682", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3682"], "modified": "2019-12-17T20:23:00", "cpe": ["cpe:/a:oracle:mysql:5.1.38", "cpe:/a:oracle:mysql:5.1.45", "cpe:/a:oracle:mysql:5.0.52", "cpe:/a:mysql:mysql:5.0.20", "cpe:/a:oracle:mysql:5.0.46", "cpe:/a:mysql:mysql:5.1.48", "cpe:/a:oracle:mysql:5.0.89", "cpe:/a:mysql:mysql:5.0.36", "cpe:/a:oracle:mysql:5.1.28", "cpe:/a:oracle:mysql:5.1.14", "cpe:/a:oracle:mysql:5.1.10", "cpe:/a:oracle:mysql:5.0.90", "cpe:/a:oracle:mysql:5.0.38", "cpe:/a:oracle:mysql:5.0.45", "cpe:/a:oracle:mysql:5.0.82", "cpe:/a:mysql:mysql:5.0.0", "cpe:/a:oracle:mysql:5.1.2", "cpe:/a:oracle:mysql:5.0.88", "cpe:/a:oracle:mysql:5.0.58", "cpe:/a:mysql:mysql:5.1.31", "cpe:/a:oracle:mysql:5.1.26", "cpe:/a:oracle:mysql:5.1.31", "cpe:/a:oracle:mysql:5.1.35", "cpe:/a:mysql:mysql:5.0.30", "cpe:/a:oracle:mysql:5.1.27", "cpe:/a:oracle:mysql:5.0.51", "cpe:/a:oracle:mysql:5.1.36", "cpe:/a:oracle:mysql:5.0.85", "cpe:/a:oracle:mysql:5.1.30", "cpe:/a:mysql:mysql:5.0.66", "cpe:/a:mysql:mysql:5.1.37", "cpe:/a:oracle:mysql:5.1.24", "cpe:/a:oracle:mysql:5.1.1", "cpe:/a:mysql:mysql:5.0.82", "cpe:/a:mysql:mysql:5.1.34", "cpe:/a:oracle:mysql:5.0.67", "cpe:/a:mysql:mysql:5.1.23", "cpe:/a:oracle:mysql:5.1.11", "cpe:/a:oracle:mysql:5.0.64", "cpe:/a:oracle:mysql:5.1.16", "cpe:/a:mysql:mysql:5.0.56", "cpe:/a:oracle:mysql:5.0.32", "cpe:/a:oracle:mysql:5.0.74", "cpe:/a:oracle:mysql:5.1.20", "cpe:/a:oracle:mysql:5.0.75", "cpe:/a:oracle:mysql:5.1.33", "cpe:/a:oracle:mysql:5.0.56", "cpe:/a:mysql:mysql:5.0.84", "cpe:/a:oracle:mysql:5.0.42", "cpe:/a:oracle:mysql:5.0.78", "cpe:/a:oracle:mysql:5.1.40", "cpe:/a:oracle:mysql:5.1.19", "cpe:/a:oracle:mysql:5.1.44", "cpe:/a:oracle:mysql:5.0.77", "cpe:/a:oracle:mysql:5.0.72", "cpe:/a:oracle:mysql:5.0.48", "cpe:/a:mysql:mysql:5.0.1", "cpe:/a:oracle:mysql:5.1.34", "cpe:/a:oracle:mysql:5.1.41", "cpe:/a:mysql:mysql:5.0.10", "cpe:/a:mysql:mysql:5.0.15", "cpe:/a:oracle:mysql:5.1.4", "cpe:/a:mysql:mysql:5.0.16", "cpe:/a:oracle:mysql:5.0.62", "cpe:/a:oracle:mysql:5.0.83", "cpe:/a:oracle:mysql:5.0.36", "cpe:/a:oracle:mysql:5.0.87", "cpe:/a:oracle:mysql:5.0.86", "cpe:/a:oracle:mysql:5.1.17", "cpe:/a:oracle:mysql:5.1.47", "cpe:/a:oracle:mysql:5.0.70", "cpe:/a:oracle:mysql:5.1.37", "cpe:/a:oracle:mysql:5.0.76", "cpe:/a:oracle:mysql:5.1.46", "cpe:/a:oracle:mysql:5.1.18", "cpe:/a:mysql:mysql:5.0.74", "cpe:/a:oracle:mysql:5.0.79", "cpe:/a:oracle:mysql:5.1.23", "cpe:/a:mysql:mysql:5.0.72", "cpe:/a:oracle:mysql:5.1.25", "cpe:/a:oracle:mysql:5.1.22", "cpe:/a:mysql:mysql:5.0.91", "cpe:/a:mysql:mysql:5.0.60", "cpe:/a:oracle:mysql:5.0.68", "cpe:/a:mysql:mysql:5.0.24", "cpe:/a:oracle:mysql:5.0.66", "cpe:/a:oracle:mysql:5.0.30", "cpe:/a:oracle:mysql:5.0.50", "cpe:/a:mysql:mysql:5.0.44", "cpe:/a:oracle:mysql:5.0.44", "cpe:/a:oracle:mysql:5.0.81", "cpe:/a:oracle:mysql:5.0.41", "cpe:/a:mysql:mysql:5.0.54", "cpe:/a:oracle:mysql:5.1.21", "cpe:/a:oracle:mysql:5.1.29", "cpe:/a:mysql:mysql:5.1.32", "cpe:/a:oracle:mysql:5.1.43", "cpe:/a:oracle:mysql:5.1.13", "cpe:/a:oracle:mysql:5.0.34", "cpe:/a:mysql:mysql:5.0.87", "cpe:/a:mysql:mysql:5.0.2", "cpe:/a:oracle:mysql:5.0.84", "cpe:/a:mysql:mysql:5.0.17", "cpe:/a:oracle:mysql:5.0.80", "cpe:/a:oracle:mysql:5.0.28", "cpe:/a:oracle:mysql:5.1.42", "cpe:/a:oracle:mysql:5.1.12", "cpe:/a:oracle:mysql:5.1.39", "cpe:/a:oracle:mysql:5.1.3", "cpe:/a:oracle:mysql:5.0.40", "cpe:/a:oracle:mysql:5.1.15"], "id": "CVE-2010-3682", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3682", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.91:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.76:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.51:a:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.72:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.74:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.79:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.80:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.78:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.68:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.66:a:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.82:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.87:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.74:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.84:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.51:b:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.72:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.70:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*"]}, {"lastseen": "2022-05-14T13:59:21", "description": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via certain arguments to the BINLOG command, which triggers an access of uninitialized memory, as demonstrated by valgrind.", "cvss3": {}, "published": "2011-01-11T20:00:00", "type": "cve", "title": "CVE-2010-3679", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3679"], "modified": "2019-12-17T20:23:00", "cpe": ["cpe:/a:oracle:mysql:5.1.44", "cpe:/a:oracle:mysql:5.1.38", "cpe:/a:oracle:mysql:5.1.45", "cpe:/a:oracle:mysql:5.1.27", "cpe:/a:oracle:mysql:5.1.36", "cpe:/a:oracle:mysql:5.1.7", "cpe:/a:oracle:mysql:5.1.6", "cpe:/a:oracle:mysql:5.1.34", "cpe:/a:oracle:mysql:5.1.30", "cpe:/a:oracle:mysql:5.1.41", "cpe:/a:mysql:mysql:5.1.37", "cpe:/a:oracle:mysql:5.1.4", "cpe:/a:oracle:mysql:5.1.24", "cpe:/a:oracle:mysql:5.1.1", "cpe:/a:mysql:mysql:5.1.5", "cpe:/a:mysql:mysql:5.1.34", "cpe:/a:oracle:mysql:5.1.17", "cpe:/a:oracle:mysql:5.1.21", "cpe:/a:oracle:mysql:5.1.28", "cpe:/a:oracle:mysql:5.1.14", "cpe:/a:oracle:mysql:5.1.10", "cpe:/a:oracle:mysql:5.1.29", "cpe:/a:mysql:mysql:5.1.23", "cpe:/a:oracle:mysql:5.1.9", "cpe:/a:oracle:mysql:5.1.11", "cpe:/a:oracle:mysql:5.1.16", "cpe:/a:mysql:mysql:5.1.32", "cpe:/a:oracle:mysql:5.1.47", "cpe:/a:oracle:mysql:5.1", "cpe:/a:oracle:mysql:5.1.43", "cpe:/a:oracle:mysql:5.1.13", "cpe:/a:oracle:mysql:5.1.37", "cpe:/a:oracle:mysql:5.1.48", "cpe:/a:oracle:mysql:5.1.20", "cpe:/a:oracle:mysql:5.1.46", "cpe:/a:oracle:mysql:5.1.2", "cpe:/a:oracle:mysql:5.1.18", "cpe:/a:oracle:mysql:5.1.33", "cpe:/a:oracle:mysql:5.1.23", "cpe:/a:mysql:mysql:5.1.31", "cpe:/a:oracle:mysql:5.1.8", "cpe:/a:oracle:mysql:5.1.40", "cpe:/a:oracle:mysql:5.1.42", "cpe:/a:oracle:mysql:5.1.26", "cpe:/a:oracle:mysql:5.1.25", "cpe:/a:oracle:mysql:5.1.19", "cpe:/a:oracle:mysql:5.1.12", "cpe:/a:oracle:mysql:5.1.31", "cpe:/a:oracle:mysql:5.1.39", "cpe:/a:oracle:mysql:5.1.3", "cpe:/a:oracle:mysql:5.1.22", "cpe:/a:oracle:mysql:5.1.35", "cpe:/a:oracle:mysql:5.1.15"], "id": "CVE-2010-3679", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3679", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*"]}, {"lastseen": "2022-05-14T13:59:20", "description": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.", "cvss3": {}, "published": "2011-01-11T20:00:00", "type": "cve", "title": "CVE-2010-3677", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3677"], "modified": "2019-12-17T20:23:00", "cpe": ["cpe:/a:oracle:mysql:5.1.38", "cpe:/a:oracle:mysql:5.1.45", "cpe:/a:oracle:mysql:5.0.52", "cpe:/a:mysql:mysql:5.0.20", "cpe:/a:oracle:mysql:5.0.46", "cpe:/a:mysql:mysql:5.1.48", "cpe:/a:oracle:mysql:5.0.89", "cpe:/a:mysql:mysql:5.0.36", "cpe:/a:oracle:mysql:5.1.28", "cpe:/a:oracle:mysql:5.1.14", "cpe:/a:oracle:mysql:5.1.10", "cpe:/a:oracle:mysql:5.0.90", "cpe:/a:oracle:mysql:5.0.38", "cpe:/a:oracle:mysql:5.0.45", "cpe:/a:oracle:mysql:5.0.82", "cpe:/a:mysql:mysql:5.0.0", "cpe:/a:oracle:mysql:5.1.2", "cpe:/a:oracle:mysql:5.0.88", "cpe:/a:oracle:mysql:5.0.58", "cpe:/a:mysql:mysql:5.1.31", "cpe:/a:oracle:mysql:5.1.26", "cpe:/a:oracle:mysql:5.1.31", "cpe:/a:oracle:mysql:5.1.35", "cpe:/a:mysql:mysql:5.0.30", "cpe:/a:oracle:mysql:5.1.27", "cpe:/a:oracle:mysql:5.0.51", "cpe:/a:oracle:mysql:5.1.36", "cpe:/a:oracle:mysql:5.0.85", "cpe:/a:oracle:mysql:5.1.30", "cpe:/a:mysql:mysql:5.0.66", "cpe:/a:mysql:mysql:5.1.37", "cpe:/a:oracle:mysql:5.1.24", "cpe:/a:oracle:mysql:5.1.1", "cpe:/a:mysql:mysql:5.0.82", "cpe:/a:mysql:mysql:5.1.34", "cpe:/a:oracle:mysql:5.0.67", "cpe:/a:mysql:mysql:5.1.23", "cpe:/a:oracle:mysql:5.1.11", "cpe:/a:oracle:mysql:5.0.64", "cpe:/a:oracle:mysql:5.1.16", "cpe:/a:mysql:mysql:5.0.56", "cpe:/a:oracle:mysql:5.0.32", "cpe:/a:oracle:mysql:5.0.74", "cpe:/a:oracle:mysql:5.1.20", "cpe:/a:oracle:mysql:5.0.75", "cpe:/a:oracle:mysql:5.1.33", "cpe:/a:oracle:mysql:5.0.56", "cpe:/a:mysql:mysql:5.0.84", "cpe:/a:oracle:mysql:5.0.42", "cpe:/a:oracle:mysql:5.0.78", "cpe:/a:oracle:mysql:5.1.40", "cpe:/a:oracle:mysql:5.1.19", "cpe:/a:oracle:mysql:5.1.44", "cpe:/a:oracle:mysql:5.0.77", "cpe:/a:oracle:mysql:5.0.72", "cpe:/a:oracle:mysql:5.0.48", "cpe:/a:mysql:mysql:5.0.1", "cpe:/a:oracle:mysql:5.1.34", "cpe:/a:oracle:mysql:5.1.41", "cpe:/a:mysql:mysql:5.0.10", "cpe:/a:mysql:mysql:5.0.15", "cpe:/a:oracle:mysql:5.1.4", "cpe:/a:mysql:mysql:5.0.16", "cpe:/a:oracle:mysql:5.0.62", "cpe:/a:oracle:mysql:5.0.83", "cpe:/a:oracle:mysql:5.0.36", "cpe:/a:oracle:mysql:5.0.87", "cpe:/a:oracle:mysql:5.0.86", "cpe:/a:oracle:mysql:5.1.17", "cpe:/a:oracle:mysql:5.1.47", "cpe:/a:oracle:mysql:5.0.70", "cpe:/a:oracle:mysql:5.1.37", "cpe:/a:oracle:mysql:5.0.76", "cpe:/a:oracle:mysql:5.1.46", "cpe:/a:oracle:mysql:5.1.18", "cpe:/a:mysql:mysql:5.0.74", "cpe:/a:oracle:mysql:5.0.79", "cpe:/a:oracle:mysql:5.1.23", "cpe:/a:mysql:mysql:5.0.72", "cpe:/a:oracle:mysql:5.1.25", "cpe:/a:oracle:mysql:5.1.22", "cpe:/a:mysql:mysql:5.0.91", "cpe:/a:mysql:mysql:5.0.60", "cpe:/a:oracle:mysql:5.0.68", "cpe:/a:mysql:mysql:5.0.24", "cpe:/a:oracle:mysql:5.0.66", "cpe:/a:oracle:mysql:5.0.30", "cpe:/a:oracle:mysql:5.0.50", "cpe:/a:mysql:mysql:5.0.44", "cpe:/a:oracle:mysql:5.0.44", "cpe:/a:oracle:mysql:5.0.81", "cpe:/a:oracle:mysql:5.0.41", "cpe:/a:mysql:mysql:5.0.54", "cpe:/a:oracle:mysql:5.1.21", "cpe:/a:oracle:mysql:5.1.29", "cpe:/a:mysql:mysql:5.1.32", "cpe:/a:oracle:mysql:5.1.43", "cpe:/a:oracle:mysql:5.1.13", "cpe:/a:oracle:mysql:5.0.34", "cpe:/a:mysql:mysql:5.0.87", "cpe:/a:mysql:mysql:5.0.2", "cpe:/a:oracle:mysql:5.0.84", "cpe:/a:mysql:mysql:5.0.17", "cpe:/a:oracle:mysql:5.0.80", "cpe:/a:oracle:mysql:5.0.28", "cpe:/a:oracle:mysql:5.1.42", "cpe:/a:oracle:mysql:5.1.12", "cpe:/a:oracle:mysql:5.1.39", "cpe:/a:oracle:mysql:5.1.3", "cpe:/a:oracle:mysql:5.0.40", "cpe:/a:oracle:mysql:5.1.15"], "id": "CVE-2010-3677", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3677", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.91:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.76:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.51:a:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.72:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.74:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.79:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.80:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.78:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.68:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.66:a:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.82:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.87:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.74:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.84:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.51:b:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.72:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.70:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:04:39", "description": "MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service (server crash and database loss) via an ALTER DATABASE command with a #mysql50# string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which causes MySQL to move certain directories to the server data directory.", "cvss3": {}, "published": "2010-07-13T20:30:00", "type": "cve", "title": "CVE-2010-2008", "cwe": ["CWE-77"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-2008"], "modified": "2020-11-09T14:33:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:6.06", "cpe:/o:canonical:ubuntu_linux:10.10", "cpe:/o:canonical:ubuntu_linux:9.10", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:canonical:ubuntu_linux:11.04", "cpe:/o:fedoraproject:fedora:13", "cpe:/o:canonical:ubuntu_linux:8.04"], "id": "CVE-2010-2008", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2008", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"]}], "ubuntucve": [{"lastseen": "2021-11-22T21:57:54", "description": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a\ndenial of service (crash) via (1) IN or (2) CASE operations with NULL\narguments that are explicitly specified or indirectly provided by the WITH\nROLLUP modifier.\n\n#### Bugs\n\n * <http://bugs.mysql.com/bug.php?id=54477>\n * <https://bugzilla.redhat.com/show_bug.cgi?id=628172>\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598580>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[jdstrand](<https://launchpad.net/~jdstrand>) | mysql-cluster-7.0 not supported per server team \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | fixed in 5.1.49 reproducer: select greatest((((1) in ((null),(-10),(0.5)))),(1)); doesn't apply to 5.0.x\n", "cvss3": {}, "published": "2010-11-05T00:00:00", "type": "ubuntucve", "title": "CVE-2010-3678", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3678"], "modified": "2010-11-05T00:00:00", "id": "UB:CVE-2010-3678", "href": "https://ubuntu.com/security/CVE-2010-3678", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-11-22T21:57:55", "description": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when\na LOAD DATA INFILE request generates SQL errors, which allows remote\nauthenticated users to cause a denial of service (mysqld daemon crash) via\na crafted request.\n\n#### Bugs\n\n * <http://bugs.mysql.com/bug.php?id=52512>\n * <https://bugzilla.redhat.com/show_bug.cgi?id=628698>\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598580>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[jdstrand](<https://launchpad.net/~jdstrand>) | mysql-cluster-7.0 not supported per server team \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | fixed in 5.1.49 patch doesn't seem applicable to 5.0.x\n", "cvss3": {}, "published": "2010-11-05T00:00:00", "type": "ubuntucve", "title": "CVE-2010-3683", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3683"], "modified": "2010-11-05T00:00:00", "id": "UB:CVE-2010-3683", "href": "https://ubuntu.com/security/CVE-2010-3683", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-11-22T21:57:54", "description": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a\ndenial of service (mysqld daemon crash) by creating temporary tables with\nnullable columns while using InnoDB, which triggers an assertion failure.\n\n#### Bugs\n\n * <http://bugs.mysql.com/bug.php?id=54044>\n * <https://bugzilla.redhat.com/show_bug.cgi?id=628192>\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598580>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[jdstrand](<https://launchpad.net/~jdstrand>) | mysql-cluster-7.0 not supported per server team \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | fixed in 5.1.49\n", "cvss3": {}, "published": "2010-11-05T00:00:00", "type": "ubuntucve", "title": "CVE-2010-3680", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3680"], "modified": "2010-11-05T00:00:00", "id": "UB:CVE-2010-3680", "href": "https://ubuntu.com/security/CVE-2010-3680", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-11-22T21:57:54", "description": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote\nauthenticated users to cause a denial of service (mysqld daemon crash) by\nusing the HANDLER interface and performing \"alternate reads from two\nindexes on a table,\" which triggers an assertion failure.\n\n#### Bugs\n\n * <http://bugs.mysql.com/bug.php?id=54007>\n * <https://bugzilla.redhat.com/show_bug.cgi?id=628680>\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598580>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[jdstrand](<https://launchpad.net/~jdstrand>) | mysql-cluster-7.0 not supported per server team \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | fixed in 5.1.49\n", "cvss3": {}, "published": "2010-11-05T00:00:00", "type": "ubuntucve", "title": "CVE-2010-3681", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3681"], "modified": "2010-11-05T00:00:00", "id": "UB:CVE-2010-3681", "href": "https://ubuntu.com/security/CVE-2010-3681", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-11-22T21:57:56", "description": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote\nauthenticated users to cause a denial of service (mysqld daemon crash) by\nusing EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE\n...)\" statements, which triggers a NULL pointer dereference in the\nItem_singlerow_subselect::store function.\n\n#### Bugs\n\n * <http://bugs.mysql.com/bug.php?id=52711>\n * <https://bugzilla.redhat.com/show_bug.cgi?id=628328>\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598580>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[jdstrand](<https://launchpad.net/~jdstrand>) | mysql-cluster-7.0 not supported per server team \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | fixed in 5.1.49\n", "cvss3": {}, "published": "2010-11-05T00:00:00", "type": "ubuntucve", "title": "CVE-2010-3682", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3682"], "modified": "2010-11-05T00:00:00", "id": "UB:CVE-2010-3682", "href": "https://ubuntu.com/security/CVE-2010-3682", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-11-22T21:57:54", "description": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a\ndenial of service (mysqld daemon crash) via certain arguments to the BINLOG\ncommand, which triggers an access of uninitialized memory, as demonstrated\nby valgrind.\n\n#### Bugs\n\n * <http://bugs.mysql.com/bug.php?id=54393>\n * <https://bugzilla.redhat.com/show_bug.cgi?id=628062>\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598580>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[jdstrand](<https://launchpad.net/~jdstrand>) | mysql-cluster-7.0 not supported per server team \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | code doesn't seem present in 5.0.x\n", "cvss3": {}, "published": "2010-11-05T00:00:00", "type": "ubuntucve", "title": "CVE-2010-3679", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3679"], "modified": "2010-11-05T00:00:00", "id": "UB:CVE-2010-3679", "href": "https://ubuntu.com/security/CVE-2010-3679", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-11-22T21:57:54", "description": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote\nauthenticated users to cause a denial of service (mysqld daemon crash) via\na join query that uses a table with a unique SET column.\n\n#### Bugs\n\n * <http://bugs.mysql.com/bug.php?id=54575>\n * <https://bugzilla.redhat.com/show_bug.cgi?id=628040>\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598580>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[jdstrand](<https://launchpad.net/~jdstrand>) | mysql-cluster-7.0 not supported per server team \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | fixed in 5.1.49.\n", "cvss3": {}, "published": "2010-11-05T00:00:00", "type": "ubuntucve", "title": "CVE-2010-3677", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3677"], "modified": "2010-11-05T00:00:00", "id": "UB:CVE-2010-3677", "href": "https://ubuntu.com/security/CVE-2010-3677", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-11-22T21:58:27", "description": "MySQL before 5.1.48 allows remote authenticated users with alter database\nprivileges to cause a denial of service (server crash and database loss)\nvia an ALTER DATABASE command with a #mysql50# string followed by a .\n(dot), .. (dot dot), ../ (dot dot slash) or similar sequence, and an\nUPGRADE DATA DIRECTORY NAME command, which causes MySQL to move certain\ndirectories to the server data directory.\n\n#### Bugs\n\n * <http://bugs.mysql.com/bug.php?id=53804>\n * <https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2008>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[jdstrand](<https://launchpad.net/~jdstrand>) | PoC in upstream report (remeber to add UPGRADE DATA DIRECTORY NAME)\n", "cvss3": {}, "published": "2010-07-13T00:00:00", "type": "ubuntucve", "title": "CVE-2010-2008", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-2008"], "modified": "2010-07-13T00:00:00", "id": "UB:CVE-2010-2008", "href": "https://ubuntu.com/security/CVE-2010-2008", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}]}