English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 72022 CVE descriptions
and 38680 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55520
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 833-2 (mysql-dfsg-4.1)
Summary:Debian Security Advisory DSA 833-2 (mysql-dfsg-4.1)
Description:The remote host is missing an update to mysql-dfsg-4.1
announced via advisory DSA 833-2.

A stack-based buffer overflow in the init_syms function of MySQL, a
popular database, has been discovered that allows remote authenticated
users who can create user-defined functions to execute arbitrary code
via a long function_name field. The ability to create user-defined
functions is not typically granted to untrusted users.

The following vulnerability matrix explains which version of MySQL in
which distribution has this problem fixed:

woody sarge sid
mysql 3.23.49-8.14 n/a n/a
mysql-dfsg n/a 4.0.24-10sarge1 4.0.24-10sarge1
mysql-dfsg-4.1 n/a 4.1.11a-4sarge2 4.1.14-2
mysql-dfsg-5.0 n/a n/a 5.0.11beta-3

This update only covers binary packages for the big endian MIPS
architecture that was mysteriously forgotton in the earlier update.

We recommend that you upgrade your mysql-dfsg-4.1 packages.

Solution:
http://www.securityspace.com/smysecure/catid.html?in=DSA%20833-2
Cross-Ref: BugTraq ID: 14509
Common Vulnerability Exposure (CVE) ID: CVE-2005-2558
Bugtraq: 20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=112354450412427&w=2
http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html
http://www.appsecinc.com/resources/alerts/mysql/2005-002.html
Debian Security Information: DSA-829 (Google Search)
http://www.debian.org/security/2005/dsa-829
Debian Security Information: DSA-831 (Google Search)
http://www.debian.org/security/2005/dsa-831
Debian Security Information: DSA-833 (Google Search)
http://www.debian.org/security/2005/dsa-833
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html
http://www.mandriva.com/security/advisories?name=MDKSA-2005:163
SCO Security Bulletin: SCOSA-2006.18
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
SuSE Security Announcement: SUSE-SR:2005:021 (Google Search)
http://www.novell.com/linux/security/advisories/2005_21_sr.html
http://www.ubuntulinux.org/usn/usn-180-1/document_view
http://www.ubuntulinux.org/support/documentation/usn/usn-180-2
http://www.securityfocus.com/bid/14509
http://www.vupen.com/english/advisories/2008/1326/references
http://secunia.com/advisories/17027
http://secunia.com/advisories/20381
http://secunia.com/advisories/29847
XForce ISS Database: mysql-user-defined-function-bo(21737)
http://xforce.iss.net/xforce/xfdb/21737
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 38680 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.