Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several vulnerabilities have been discovered in MySQL, a popular
database. The Common Vulnerabilities and Exposures project identifies
the following problems:
Sergei Golubchik discovered a problem in the access handling for
similar named databases. If a user is granted rights to a
database with a name containing an underscore ("_"), the user also
gains rights to other databases with similar names.
Stefano Di Paola discovered that MySQL permits remote
authenticated users with INSERT and DELETE rights to execute
arbitrary code by using CREATE FUNCTION to access libc calls.
Stefano Di Paola discovered that MySQL permits remote authenticated
users with INSERT and DELETE rights to bypass library path
restrictions and execute arbitrary libraries by using INSERT INTO
to modify the mysql.func table.
Stefano Di Paola discovered that MySQL uses predictable file names
when creating temporary tables, which permits local users with
CREATE TEMPORARY TABLE rights to overwrite arbitrary files via
a symlink attack.
For the stable distribution (woody) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
version 4.0.24-5 of mysql-dfsg and in version 4.1.10a-6 of
We recommend that you upgrade your mysql packages.
Solution : http://www.debian.org/security/2005/dsa-707
Network Security Threat Level: High
Networks Security ID: 12781
Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi
|Kikstart - Mastertronic (C64 / Atari 800XL, 130XE), Rare Vintage
|ATARI ARCADE DUO POWERED IPAD, IPAD 2 & IPAD 3 W/JOYSTICK CONTROLLER.
|Atari 800XL Home Computer
|ATARI ST - ST BASIC Source Book and Tutorial
No Discussions have been posted on this vulnerability.