Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: SuSE Local Security Checks --> Category: infos

SUSE-SA:2005:019: mysql Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the mysql package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory SUSE-SA:2005:019 (mysql).

MySQL is an Open Source database server, commonly used together with
web services provided by PHP scripts or similar.

This security update fixes a broken mysqlhotcopy script as well as
several security related bugs:

- CVE-2005-0709: MySQL allowed remote authenticated users with
INSERT and DELETE rights to execute arbitrary code by using
CREATE FUNCTION to access libc calls, as demonstrated by using strcat,
on_exit, and exit.

- CVE-2005-0710: MySQL allowed remote authenticated users with
INSERT and DELETE rights to bypass library path restrictions
and execute arbitrary libraries by using INSERT INTO to modify the
mysql.func table, which is processed by the udf_init function.

- CVE-2005-0711: MySQL used predictable file names when creating
temporary tables, which allows local users with CREATE TEMPORARY
TABLE rights to overwrite arbitrary files via a symlink attack.

The first two vulnerabilities can be exploited by a possible hacker using
SQL inject attack vectors into a flawed PHP application for instance.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.