Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200410-22] MySQL: Multiple vulnerabilities

Vulnerability Assessment Details

[GLSA-200410-22] MySQL: Multiple vulnerabilities

Vulnerability Assessment Summary
MySQL: Multiple vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200410-22
(MySQL: Multiple vulnerabilities)

The following vulnerabilities were found and fixed in MySQL:
Oleksandr Byelkin found that ALTER TABLE ... RENAME checks CREATE/INSERT
rights of the old table instead of the new one (CVE-2004-0835). Another
privilege checking bug permited users to grant rights on a database they had
no rights on.
Dean Ellis found a defect where multiple threads ALTERing the MERGE tables
to change the UNION could cause the server to crash (CVE-2004-0837).
Another crash was found in MATCH ... AGAINST() queries with missing closing
double quote.
Finally, a buffer overrun in the mysql_real_connect function was found by
Lukasz Wojtow (CVE-2004-0836).


The privilege checking issues could be used by remote users to bypass their
rights on databases. The two crashes issues could be exploited by a remote
user to perform a Denial of Service attack on MySQL server. The buffer
overrun issue could also be exploited as a Denial of Service attack, and
may permit to execute arbitrary code with the rights of the MySQL daemon
(typically, the "mysql" user).


There is no known workaround at this time.


All MySQL users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=dev-db/mysql-4.0.21"
# emerge ">=dev-db/mysql-4.0.21"

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Seagate ST9320423AS 2.5” SATA 7200RPM 16MB Cache 320GB HDD for laptop
Seagate ST9320423AS 2.5” SATA 7200RPM 16MB Cache 320GB HDD for laptop picture


No Discussions have been posted on this vulnerability.