Description: | Description:
The remote host is missing an update to MySQL announced via advisory MDKSA-2002:087.
Two vulnerabilities were discovered in all versions of MySQL prior to 3.23.53a and 4.0.5a by Stefan Esser. The first can be used by any valid MySQL user to crash the MySQL server, the other allows anyone to bypass the MySQL password check or execute arbitraty code with the privilege of the user running mysqld. Another two vulnerabilities were found, one an arbitrary size heap overflow in the mysql client library and another that allows one to write '\0' to any memory address. Both of these flaws could allow DOS attacks or arbitary code execution within anything linked against libmysqlclient.
Affected versions: 7.2, 8.0, 8.1, 8.2, 9.0, Single Network Firewall 7.2
Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2002:087 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1373 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1374 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1375 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1376 http://security.e-matters.de/advisories/042002.html
Risk factor : High
CVSS Score: 7.5
|