|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Remote file access >> MySQL mysqld Privilege Escalation Vulnerability Vulnerability Assessment Details
|
MySQL mysqld Privilege Escalation Vulnerability |
||
Checks for the remote MySQL version Detailed Explanation for this Vulnerability Assessment You are running a version of MySQL which is older than version 3.23.56. It is vulnerable to a vulnerability that may permit the mysqld service to start with elevated rights. A possible hacker can exploit this vulnerability by creating a DATADIR/my.cnf that includes the line 'user=root' under the '[mysqld]' option section. When the mysqld service is executed, it will run as the root user instead of the default user. Network Security Threat Level: High Solution : Upgrade to at least version 3.23.56 Networks Security ID: 7052 Vulnerability Assessment Copyright: This script is Copyright (C) 2003 StrongHoldNet |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |