Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Slackware Local Security Checks >> SSA-2006-155-01 mysql


Vulnerability Assessment Details

SSA-2006-155-01 mysql

Vulnerability Assessment Summary
SSA-2006-155-01 mysql

Detailed Explanation for this Vulnerability Assessment

New mysql packages are available for Slackware 9.1, 10.0, 10.1,
10.2 and -current to fix security issues.


The MySQL packages shipped with Slackware 9.1, 10.0, and 10.1
may possibly leak sensitive information found in uninitialized
memory to authenticated users. This is fixed in the new packages,
and was already patched in Slackware 10.2 and -current.
Since the vulnerabilities require a valid login and/or access to the
database server, the risk is moderate. Slackware does not provide
network access to a MySQL database by default.

More details about the issues may be found in the Common
Vulnerabilities and Exposures (CVE) database.
Fixes that affect Slackware 9.1, 10.0, and 10.1:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517


The MySQL packages in Slackware 10.2 and -current have been
upgraded to MySQL 4.1.20 (Slackware 10.2) and MySQL 5.0.22
(Slackware -current) to fix an SQL injection vulnerability.

For more details, see the MySQL 4.1.20 release announcement here:
http://lists.mysql.com/announce/364
And the MySQL 5.0.22 release announcement here:
http://lists.mysql.com/announce/365
The CVE entry for this issue can be found here:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2753


Here are the details from the Slackware 10.1 ChangeLog:
+--------------------------+
patches/packages/mysql-4.0.27-i486-1_slack10.1.tgz:
Upgraded to mysql-4.0.27.
This fixes some minor security issues with possible information leakage.
Note that the information leakage bugs require that the attacker have
access to an account on the database. Also note that by default,
Slackware's rc.mysqld script does *not* permit access to the database
through the outside network (it uses the --skip-networking option).
If you've enabled network access to MySQL, it is a good idea to filter
the port (3306) to prevent access from unauthorized machines.
For more details, see the MySQL 4.0.27 release announcement here:
http://lists.mysql.com/announce/359
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517
(* Security fix *)
+--------------------------+



Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Michel Arboi

Cables, Connectors

HP ProLiant BL460c G6 Blade Server Dual Xeon E5520 QC 2.26GHz 8GB
$49.0
HP ProLiant BL460c G6 Blade Server Dual Xeon E5520 QC 2.26GHz 8GB pictureEnergy-Efficient High-End DELL PE R610 2x2.26Ghz L5640 6C 192G 2x300G SSD 4x600G
$1539.3
Energy-Efficient High-End DELL PE R610 2x2.26Ghz L5640 6C 192G 2x300G SSD 4x600G pictureDELL PE R610 Low Power Consumption 8-Core 64GB 6x 300GB 10K SAS 90-Day Warranty
$590.1
DELL PE R610 Low Power Consumption 8-Core 64GB 6x 300GB 10K SAS 90-Day Warranty pictureMid-Level Enterprise HP PL DL380 G7 2x 2.66Ghz X5650 6C 72GB 6x 1TB
$799.05
Mid-Level Enterprise HP PL DL380 G7 2x 2.66Ghz X5650 6C 72GB 6x 1TB picture


Discussions

No Discussions have been posted on this vulnerability.