![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.12.2005.63.1 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-63-1) |
Summary: | The remote host is missing an update for the 'mysql-dfsg' package(s) announced via the USN-63-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'mysql-dfsg' package(s) announced via the USN-63-1 advisory. Vulnerability Insight: Javier Fernandez-Sanguino Pena noticed that the 'mysqlaccess' program created temporary files in an insecure manner. This could allow a symbolic link attack to create or overwrite arbitrary files with the privileges of the user invoking the program. Affected Software/OS: 'mysql-dfsg' package(s) on Ubuntu 4.10. Solution: Please install the updated package(s). CVSS Score: 4.6 CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-0004 BugTraq ID: 12277 http://www.securityfocus.com/bid/12277 Bugtraq: 20050118 [USN-63-1] MySQL client vulnerability (Google Search) http://marc.info/?l=bugtraq&m=110608297217224&w=2 Conectiva Linux advisory: CLA-2005:947 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947 Debian Security Information: DSA-647 (Google Search) http://www.debian.org/security/2005/dsa-647 http://www.mandriva.com/security/advisories?name=MDKSA-2005:036 http://secunia.com/advisories/13867 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1 XForce ISS Database: mysql-mysqlaccess-symlink(18922) https://exchange.xforce.ibmcloud.com/vulnerabilities/18922 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |