|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA707] DSA-707-1 mysql Vulnerability Assessment Details
|
[DSA707] DSA-707-1 mysql |
||
DSA-707-1 mysql Detailed Explanation for this Vulnerability Assessment Several vulnerabilities have been discovered in MySQL, a popular database. The Common Vulnerabilities and Exposures project identifies the following problems: Sergei Golubchik discovered a problem in the access handling for similar named databases. If a user is granted rights to a database with a name containing an underscore ("_"), the user also gains rights to other databases with similar names. Stefano Di Paola discovered that MySQL permits remote authenticated users with INSERT and DELETE rights to execute arbitrary code by using CREATE FUNCTION to access libc calls. Stefano Di Paola discovered that MySQL permits remote authenticated users with INSERT and DELETE rights to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table. Stefano Di Paola discovered that MySQL uses predictable file names when creating temporary tables, which permits local users with CREATE TEMPORARY TABLE rights to overwrite arbitrary files via a symlink attack. For the stable distribution (woody) these problems have been fixed in version 3.23.49-8.11. For the unstable distribution (sid) these problems have been fixed in version 4.0.24-5 of mysql-dfsg and in version 4.1.10a-6 of mysql-dfsg-4.1. We recommend that you upgrade your mysql packages. Solution : http://www.debian.org/security/2005/dsa-707 Network Security Threat Level: High Networks Security ID: 12781 Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi |
||
Cables, Connectors |
Apple Macintosh Performa 466 Vintage Computer | SKU 146754
$149.95
Apple Macintosh PowerBook 180 Vintage Laptop | Retro Computer
$149.95
Vintage Apple M2980 AppleDesign Keyboard - Tested and working - Good condition
$19.75
Vintage Apple Lisa Brochure, very nice condition
$50.00
Vintage A3S2 Apple III Computer With 12 Volt Motherboard 820-0043-00
$450.00
Vintage Apple Macintosh Keyboard M0110A With Original Cord Untested AS IS
$110.00
Vintage Apple Color Composite Monitor A2M6020 Power Stable, AS IS
$35.00
P1.Z) Vintage Apple 658-4081 ADB Desktop Bus Keyboard
$80.00
Vintage Apple Macintosh PowerBook G3 M4753 w/ Power Adapter
$149.00
Vintage Apple Newton MessagePad 2000 With Original Box and Some Accessories
$199.99
|
||
No Discussions have been posted on this vulnerability. |