![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.61852 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-1662-1) |
Summary: | The remote host is missing an update for the Debian 'mysql-dfsg-5.0' package(s) announced via the DSA-1662-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'mysql-dfsg-5.0' package(s) announced via the DSA-1662-1 advisory. Vulnerability Insight: A symlink traversal vulnerability was discovered in MySQL, a relational database server. The weakness could permit an attacker having both CREATE TABLE access to a database and the ability to execute shell commands on the database server to bypass MySQL access controls, enabling them to write to tables in databases to which they would not ordinarily have access. The Common Vulnerabilities and Exposures project identifies this vulnerability as CVE-2008-4098. Note that a closely aligned issue, identified as CVE-2008-4097, was prevented by the update announced in DSA-1608-1. This new update supersedes that fix and mitigates both potential attack vectors. For the stable distribution (etch), this problem has been fixed in version 5.0.32-7etch8. We recommend that you upgrade your mysql packages. Affected Software/OS: 'mysql-dfsg-5.0' package(s) on Debian 4. Solution: Please install the updated package(s). CVSS Score: 4.6 CVSS Vector: AV:N/AC:H/Au:S/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-4098 32578 http://secunia.com/advisories/32578 32759 http://secunia.com/advisories/32759 32769 http://secunia.com/advisories/32769 38517 http://secunia.com/advisories/38517 DSA-1662 http://www.debian.org/security/2008/dsa-1662 MDVSA-2009:094 http://www.mandriva.com/security/advisories?name=MDVSA-2009:094 RHSA-2009:1067 http://www.redhat.com/support/errata/RHSA-2009-1067.html RHSA-2010:0110 http://www.redhat.com/support/errata/RHSA-2010-0110.html SUSE-SR:2008:025 http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html USN-1397-1 http://www.ubuntu.com/usn/USN-1397-1 USN-671-1 http://www.ubuntu.com/usn/USN-671-1 USN-897-1 http://ubuntu.com/usn/usn-897-1 [oss-security] 20080909 Re: CVE request: MySQL incomplete fix for CVE-2008-2079 http://www.openwall.com/lists/oss-security/2008/09/09/20 [oss-security] 20080916 Re: CVE request: MySQL incomplete fix for CVE-2008-2079 http://www.openwall.com/lists/oss-security/2008/09/16/3 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25 http://bugs.mysql.com/bug.php?id=32167 mysql-myisam-symlink-security-bypass(45649) https://exchange.xforce.ibmcloud.com/vulnerabilities/45649 oval:org.mitre.oval:def:10591 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591 |
Copyright | Copyright (C) 2008 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |