Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Debian Local Security Checks --> Category: infos

[DSA707] DSA-707-1 mysql Vulnerability Scan


Vulnerability Scan Summary
DSA-707-1 mysql

Detailed Explanation for this Vulnerability Test

Several vulnerabilities have been discovered in MySQL, a popular
database. The Common Vulnerabilities and Exposures project identifies
the following problems:
Sergei Golubchik discovered a problem in the access handling for
similar named databases. If a user is granted rights to a
database with a name containing an underscore ("_"), the user also
gains rights to other databases with similar names.
Stefano Di Paola discovered that MySQL allows remote
authenticated users with INSERT and DELETE rights to execute
arbitrary code by using CREATE FUNCTION to access libc calls.
Stefano Di Paola discovered that MySQL allows remote authenticated
users with INSERT and DELETE rights to bypass library path
restrictions and execute arbitrary libraries by using INSERT INTO
to modify the mysql.func table.
Stefano Di Paola discovered that MySQL uses predictable file names
when creating temporary tables, which allows local users with
CREATE TEMPORARY TABLE rights to overwrite arbitrary files via
a symlink attack.
For the stable distribution (woody) these problems have been fixed in
version 3.23.49-8.11.
For the unstable distribution (sid) these problems have been fixed in
version 4.0.24-5 of mysql-dfsg and in version 4.1.10a-6 of
mysql-dfsg-4.1.
We recommend that you upgrade your mysql packages.


Solution : http://www.debian.org/security/2005/dsa-707
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.