Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.56730
Categoría:Slackware Local Security Checks
Título:Slackware: Security Advisory (SSA:2006-129-02)
Resumen:The remote host is missing an update for the 'mysql' package(s) announced via the SSA:2006-129-02 advisory.
Descripción:Summary:
The remote host is missing an update for the 'mysql' package(s) announced via the SSA:2006-129-02 advisory.

Vulnerability Insight:
New mysql packages are available for Slackware 10.2 and -current to
fix security issues. The MySQL package shipped with Slackware 10.2
may possibly leak sensitive information found in uninitialized
memory to authenticated users. The MySQL package previously in
Slackware -current also suffered from these flaws, but an additional
overflow could allow arbitrary code execution.

Since the vulnerabilities require a valid login and/or access to the
database server, the risk is moderate. Slackware does not provide
network access to a MySQL database by default.


More details about the issues may be found in the Common
Vulnerabilities and Exposures (CVE) database.
Issues that affect both Slackware 10.2 and -current:
[links moved to references]

An issue affecting only Slackware -current:
[link moved to references]


Here are the details from the Slackware 10.2 ChangeLog:
+--------------------------+
patches/packages/mysql-4.1.19-i486-1.tgz:
Upgraded to mysql-4.1.19.
This fixes some minor security issues with possible information leakage.
Note that the information leakage bugs require that the attacker have
access to an account on the database. Also note that by default,
Slackware's rc.mysqld script does *not* allow access to the database
through the outside network (it uses the --skip-networking option).
If you've enabled network access to MySQL, it is a good idea to filter
the port (3306) to prevent access from unauthorized machines.
For more information, see:
[links moved to references]
(* Security fix *)
+--------------------------+

Here are the details from the Slackware -current ChangeLog:
+--------------------------+
ap/mysql-5.0.21-i486-1.tgz: Upgraded to mysql-5.0.21.
This fixes some security issues, including possible information leakage, and
execution of arbitrary code. Note that the information leakage bugs require
that the attacker have access to an account on the database. Also note that
by default, Slackware's rc.mysqld script does *not* allow access to the
database through the outside network (it uses the --skip-networking option).
If you've enabled network access to MySQL, it is a good idea to filter the
port (3306) to prevent access from unauthorized machines.
For more information, see:
[links moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'mysql' package(s) on Slackware 10.2, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
6.5

CVSS Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-1516
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
BugTraq ID: 17780
http://www.securityfocus.com/bid/17780
Bugtraq: 20060502 MySQL Anonymous Login Handshake - Information Leakage. (Google Search)
http://www.securityfocus.com/archive/1/432733/100/0/threaded
Bugtraq: 20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage (Google Search)
http://www.securityfocus.com/archive/1/434164/100/0/threaded
Cert/CC Advisory: TA07-072A
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Debian Security Information: DSA-1071 (Google Search)
http://www.debian.org/security/2006/dsa-1071
Debian Security Information: DSA-1073 (Google Search)
http://www.debian.org/security/2006/dsa-1073
Debian Security Information: DSA-1079 (Google Search)
http://www.debian.org/security/2006/dsa-1079
http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:084
http://www.wisec.it/vulns.php?page=7
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918
http://www.redhat.com/support/errata/RHSA-2006-0544.html
http://securitytracker.com/id?1016017
http://secunia.com/advisories/19929
http://secunia.com/advisories/20002
http://secunia.com/advisories/20073
http://secunia.com/advisories/20076
http://secunia.com/advisories/20223
http://secunia.com/advisories/20241
http://secunia.com/advisories/20253
http://secunia.com/advisories/20333
http://secunia.com/advisories/20424
http://secunia.com/advisories/20457
http://secunia.com/advisories/20625
http://secunia.com/advisories/20762
http://secunia.com/advisories/24479
http://secunia.com/advisories/29847
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
http://securityreason.com/securityalert/840
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
SuSE Security Announcement: SUSE-SA:2006:036 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
SuSE Security Announcement: SUSE-SR:2006:012 (Google Search)
http://www.novell.com/linux/security/advisories/2006-06-02.html
http://www.trustix.org/errata/2006/0028
https://usn.ubuntu.com/283-1/
http://www.vupen.com/english/advisories/2006/1633
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2008/1326/references
XForce ISS Database: mysql-login-packet-info-disclosure(26236)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26236
Common Vulnerability Exposure (CVE) ID: CVE-2006-1517
Bugtraq: 20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution. (Google Search)
http://www.securityfocus.com/archive/1/432734/100/0/threaded
http://www.wisec.it/vulns.php?page=8
http://www.osvdb.org/25228
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036
http://securitytracker.com/id?1016016
http://securityreason.com/securityalert/839
XForce ISS Database: mysql-sqlparcecc-information-disclosure(26228)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26228
Common Vulnerability Exposure (CVE) ID: CVE-2006-1518
CERT/CC vulnerability note: VU#602457
http://www.kb.cert.org/vuls/id/602457
XForce ISS Database: mysql-comtabledump-bo(26232)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26232
CopyrightCopyright (C) 2012 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.