![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.50499 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu 4.10 USN-63-1 (mysql-dfsg) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to mysql-dfsg announced via advisory USN-63-1. Javier Fernandez-Sanguino Pena noticed that the 'mysqlaccess' program created temporary files in an insecure manner. This could allow a symbolic link attack to create or overwrite arbitrary files with the privileges of the user invoking the program. The following packages are affected: mysql-client Solution: The problem can be corrected by upgrading the affected package to version 4.0.20-2ubuntu1.2. In general, a standard system upgrade is sufficient to effect the necessary changes. http://lists.ubuntu.com/archives/ubuntu-security-announce/2005-January/000065.html Risk factor : Medium CVSS Score: 4.6 |
Cross-Ref: |
BugTraq ID: 12277 Common Vulnerability Exposure (CVE) ID: CVE-2005-0004 http://www.securityfocus.com/bid/12277 Bugtraq: 20050118 [USN-63-1] MySQL client vulnerability (Google Search) http://marc.info/?l=bugtraq&m=110608297217224&w=2 Conectiva Linux advisory: CLA-2005:947 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947 Debian Security Information: DSA-647 (Google Search) http://www.debian.org/security/2005/dsa-647 http://www.mandriva.com/security/advisories?name=MDKSA-2005:036 http://secunia.com/advisories/13867 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1 XForce ISS Database: mysql-mysqlaccess-symlink(18922) https://exchange.xforce.ibmcloud.com/vulnerabilities/18922 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |