Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:060: MySQL


Vulnerability Assessment Details

MDKSA-2005:060: MySQL

Vulnerability Assessment Summary
Check for the version of the MySQL package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:060 (MySQL).



A number of vulnerabilities were discovered by Stefano Di Paola in the MySQL
server:

If an authenticated user had INSERT rights on the 'mysql' database, the
CREATE FUNCTION command permited that user to use libc functions to execute
arbitrary code with the rights of the user running the database server
(mysql) (CVE-2005-0709).

If an authenticated user had INSERT rights on the 'mysql' database, it was
possible to load a library located in an arbitrary directory by using INSERT
INTO mysql.func instead of CREATE FUNCTION. This also would permit the user to
execute arbitrary code with the rights of the user running the database
server (CVE-2005-0710).

Finally, temporary files belonging to tables created with CREATE TEMPORARY
TABLE were handled in an insecure manner, permiting any local user to overwrite
arbitrary files with the rights of the database server (CVE-2005-0711).

The updated packages have been patched to correct these issues.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:060
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

LOT OF 12 JUNIPER NETWORKS 740-013111 REV 02 TX SP7041-M1-JN Transceivers
$79.99
LOT OF 12 JUNIPER NETWORKS 740-013111 REV 02 TX SP7041-M1-JN Transceivers  pictureJUNIPER 710-001292 4 SLOT FPC1 MODULE POWERS ON
$99.95
JUNIPER 710-001292 4 SLOT FPC1 MODULE POWERS ON pictureEX-SFP-10GE-DAC-7MA Juniper Compatible 10G SFP+ Active DAC Twinax Cable
$70.0
EX-SFP-10GE-DAC-7MA Juniper Compatible 10G SFP+ Active DAC Twinax Cable pictureEX-SFP-10GE-DAC-5MA Juniper Compatible 10G SFP+ Active DAC Twinax Cable
$65.0
EX-SFP-10GE-DAC-5MA Juniper Compatible 10G SFP+ Active DAC Twinax Cable picture


Discussions

No Discussions have been posted on this vulnerability.