|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Slackware Local Security Checks >> SSA-2006-155-01 mysql Vulnerability Assessment Details
|
SSA-2006-155-01 mysql |
||
SSA-2006-155-01 mysql Detailed Explanation for this Vulnerability Assessment New mysql packages are available for Slackware 9.1, 10.0, 10.1, 10.2 and -current to fix security issues. The MySQL packages shipped with Slackware 9.1, 10.0, and 10.1 may possibly leak sensitive information found in uninitialized memory to authenticated users. This is fixed in the new packages, and was already patched in Slackware 10.2 and -current. Since the vulnerabilities require a valid login and/or access to the database server, the risk is moderate. Slackware does not provide network access to a MySQL database by default. More details about the issues may be found in the Common Vulnerabilities and Exposures (CVE) database. Fixes that affect Slackware 9.1, 10.0, and 10.1: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517 The MySQL packages in Slackware 10.2 and -current have been upgraded to MySQL 4.1.20 (Slackware 10.2) and MySQL 5.0.22 (Slackware -current) to fix an SQL injection vulnerability. For more details, see the MySQL 4.1.20 release announcement here: http://lists.mysql.com/announce/364 And the MySQL 5.0.22 release announcement here: http://lists.mysql.com/announce/365 The CVE entry for this issue can be found here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2753 Here are the details from the Slackware 10.1 ChangeLog: +--------------------------+ patches/packages/mysql-4.0.27-i486-1_slack10.1.tgz: Upgraded to mysql-4.0.27. This fixes some minor security issues with possible information leakage. Note that the information leakage bugs require that the attacker have access to an account on the database. Also note that by default, Slackware's rc.mysqld script does *not* permit access to the database through the outside network (it uses the --skip-networking option). If you've enabled network access to MySQL, it is a good idea to filter the port (3306) to prevent access from unauthorized machines. For more details, see the MySQL 4.0.27 release announcement here: http://lists.mysql.com/announce/359 For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517 (* Security fix *) +--------------------------+ Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Michel Arboi |
||
Cables, Connectors |
HPE BL460c G9 ProLiant Blade | 2x Xeon E5-2620V3 | NO RAM | P244BR | 2xHDD Tray
$179.00
HP ProLiant BL460c G9 (Gen9) 2x E5-2670V3 12 Core 3.1GHz No Ram or No Drives
$59.98
Dell PowerEdge M620 0F9HJC Blade Server 2*E5-2670 2.60GHz 192GB RAM 2*300GB SAS
$103.99
DELL PEM640 POWEREDGE M640 BLADE SERVER
$539.95
Dell Poweredge M620 Blade Server 2x E5-2680 v2 2.8ghz 20-Cores / 256gb / H710
$499.99
Dell PowerEdge VRTX Rack Chassis 25-Bay 14.4TB HDD 2x M640 Blade 512GB RAM 2-Bay
$2335.00
DELL M630 BLADE SERVER x2 XEON E5-2660V3 @ 2.6GH H730 PERC HDD CADDIES 16GB FC
$50.00
Dell PowerEdge M640 Blade Server
$539.95
Dell PowerEdge M620 Blade Server
$39.99
Cisco UCS 5108 Blade Server Chassis Enclosure N20-C6508 4x PSU 8x Fans 2x Fabric
$139.99
|
||
No Discussions have been posted on this vulnerability. |