Family: SuSE Local Security Checks --> Category: infos
SUSE-SA:2003:003: mysql Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the mysql package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SUSE-SA:2003:003 (mysql).
Stefan Esser from e-matters reported various bugs in MySQL. Within the
MySQL server the password checking and a signedness issue has been fixed.
These could lead to a remote compromise of the system running an unpatched
MySQL server. In order to exploit this bug, the remote attacker needs a
valid MySQL account.
Further, a buffer overflow in the mysqlclient library has been reported
and fixed. Applications using this library (as commonly used from within
PHP scripts) are vulnerable to this attack and could also be compromised
by remote attackers.
Since there is no workaround possible except shutting down the MySQL
server, we strongly recommend an update.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply
Solution : http://www.suse.de/security/2003_003_mysql.html
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.