English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75516 CVE descriptions
and 39786 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51461
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2003:743
Summary:Conectiva Security Advisory CLA-2003:743
Description:
The remote host is missing updates announced in
advisory CLA-2003:743.

MySQL is a very popular SQL database, distributed under the GNU-GPL
license.

This update fixes three vulnerabilities in the versions of MySQL
distributed with Conectiva Linux:

1. Double free vulnerability[1] in the mysql_change_user() function.
An attacker with access to the MySQL server can exploit this
vulnerability to at least cause a denial of service condition (crash
the MySQL server process) by sending specially crafted data from a
client application.

2. World writeable configuration files vulnerability[2]. An attacker
with access to the MySQL server can create/overwrite a MySQL
configuration file using a SELECT * INFO OUTFILE command. This can
be exploited to, for example, cause MySQL to run as root upon
restart.

3. Password handler buffer overflow vulnerability. Frank Denis
reported[3] a buffer overflow vulnerability in the password handling
functions of MySQL. An attacker with global administrative privileges
on the MySQL server can exploit this vulnerability to execute
arbitrary code with the privileges of the user the MySQL server
process is running as.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2003-0073[4], CVE-2003-0150[5] and
CVE-2003-0780[6] to these issues, respectively.

This update brings the latest stable MySQL version available from the
3.23 serie (3.23.58). Besides the fix or the aforementioned
vulnerabilities, this new version includes several other bugfixes and
minor enhancements, which can be seen in the project changelogs[7].


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.mysql.com/doc/en/News-3.23.55.html
http://www.securityfocus.com/archive/1/314391
http://www.securityfocus.com/archive/1/337012
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0073
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0150
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0780
http://www.mysql.com/doc/en/News-3.23.x.html
http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:743
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0073
Bugtraq: 20030129 [OpenPKG-SA-2003.008] OpenPKG Security Advisory (mysql) (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=104385719107879&w=2
Conectiva Linux advisory: CLA-2003:743
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000743
Debian Security Information: DSA-303 (Google Search)
http://www.debian.org/security/2003/dsa-303
En Garde Linux Advisory: ESA-20030220-004
http://www.linuxsecurity.com/advisories/engarde_advisory-2873.html
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:013
http://www.redhat.com/support/errata/RHSA-2003-093.html
RedHat Security Advisories: RHSA-2003:094
http://www.redhat.com/support/errata/RHSA-2003-166.html
BugTraq ID: 6718
http://www.securityfocus.com/bid/6718
http://www.iss.net/security_center/static/11199.php
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:436
Common Vulnerability Exposure (CVE) ID: CVE-2003-0150
Bugtraq: 20030308 MySQL_user_can_be_changed_to_root? (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=104715840202315&w=2
Bugtraq: 20030310 Re: MySQL user can be changed to root (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=104739810523433&w=2
En Garde Linux Advisory: ESA-20030324-012
http://www.linuxsecurity.com/advisories/engarde_advisory-3046.html
http://rhn.redhat.com/errata/RHSA-2003-094.html
http://www.mandriva.com/security/advisories?name=MDKSA-2003:057
Bugtraq: 20030318 [OpenPKG-SA-2003.022] OpenPKG Security Advisory (mysql) (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=104800948128630&w=2
Bugtraq: 20030318 GLSA: mysql (200303-14) (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=104802285012750&w=2
CERT/CC vulnerability note: VU#203897
http://www.kb.cert.org/vuls/id/203897
BugTraq ID: 7052
http://www.securityfocus.com/bid/7052
XForce ISS Database: mysql-datadir-root-privileges(11510)
http://xforce.iss.net/xforce/xfdb/11510
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:442
Common Vulnerability Exposure (CVE) ID: CVE-2003-0780
Bugtraq: 20030910 Buffer overflow in MySQL (Google Search)
http://www.securityfocus.com/archive/1/337012
http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html
Bugtraq: 20030913 exploit for mysql -- [get_salt_from_password] problem (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=106364207129993&w=2
Debian Security Information: DSA-381 (Google Search)
http://www.debian.org/security/2003/dsa-381
En Garde Linux Advisory: ESA-20030918-025
http://www.mandriva.com/security/advisories?name=MDKSA-2003:094
http://www.redhat.com/support/errata/RHSA-2003-281.html
http://www.redhat.com/support/errata/RHSA-2003-282.html
http://marc.theaimsgroup.com/?l=bugtraq&m=106381424420775&w=2
CERT/CC vulnerability note: VU#516492
http://www.kb.cert.org/vuls/id/516492
http://secunia.com/advisories/9709
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 39786 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.