Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Remote file access >> MySQL mysqld Privilege Escalation Vulnerability


Vulnerability Assessment Details

MySQL mysqld Privilege Escalation Vulnerability

Vulnerability Assessment Summary
Checks for the remote MySQL version

Detailed Explanation for this Vulnerability Assessment

You are running a version of MySQL which is older than version 3.23.56.
It is vulnerable to a vulnerability that may permit the mysqld service
to start with elevated rights.

A possible hacker can exploit this vulnerability by creating a DATADIR/my.cnf
that includes the line 'user=root' under the '[mysqld]' option section.

When the mysqld service is executed, it will run as the root
user instead of the default user.

Network Security Threat Level: High
Solution : Upgrade to at least version 3.23.56

Networks Security ID: 7052

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 StrongHoldNet

Cables, Connectors

Dell PERC 5i 256MB SAS Raid Controller Card w/ Battery & Cables TU005 U8735
$9.59
Dell PERC 5i 256MB SAS Raid Controller Card w/ Battery & Cables TU005 U8735 picture40cm Serial ATA SATA 3 RAID Data HDD Hard Drive Disk Signal Cables ReRKCA
$0.74
40cm Serial ATA SATA 3 RAID Data HDD Hard Drive Disk Signal Cables ReRKCA pictureDell RAID Card WX072 Perc 5i SAS controller 256MB E2K-UCP-51 TESTED GOOD
$8.99
Dell RAID Card WX072 Perc 5i SAS controller 256MB E2K-UCP-51 TESTED GOOD  pictureRefurb WD 6TB My Book Duo Desktop RAID External Hard Drive - USB 3.1 - 2 x HDD S
$220.56
Refurb WD 6TB My Book Duo Desktop RAID External Hard Drive - USB 3.1 - 2 x HDD S picture


Discussions

No Discussions have been posted on this vulnerability.