Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2003:003: mysql


Vulnerability Assessment Details

SUSE-SA:2003:003: mysql

Vulnerability Assessment Summary
Check for the version of the mysql package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2003:003 (mysql).


Stefan Esser from e-matters reported various bugs in MySQL. Within the
MySQL server the password checking and a signedness issue has been fixed.
These could lead to a remote compromise of the system running an unpatched
MySQL server. In order to exploit this bug, the remote attacker needs a
valid MySQL account.
Further, a buffer overflow in the mysqlclient library has been reported
and fixed. Applications using this library (as commonly used from within
PHP scripts) are vulnerable to this attack and could also be compromised
by remote attackers.

Since there is no workaround possible except shutting down the MySQL
server, we strongly recommend an update.

Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply
the update.

Solution : http://www.suse.de/security/2003_003_mysql.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Cisco Linksys E2000 Router WITH ADAPTER AND ETHERNET CORD USED TESTED WORKING
$20.0
Cisco Linksys E2000 Router WITH ADAPTER AND ETHERNET CORD USED TESTED WORKING  pictureCISCO1921 K9 ISR G2
$375.0
CISCO1921 K9 ISR G2 pictureCISCO 5 SEALED DS-SFP-FC8G-SW (IN ORIGINAL PACKING)
$80.0
CISCO 5 SEALED DS-SFP-FC8G-SW (IN ORIGINAL PACKING) pictureCisco Catalyst 2960-S Series SI WS-C2960S-24TS-S V04 10/100/1000 1G SFP Switch
$5.0
Cisco Catalyst 2960-S Series SI WS-C2960S-24TS-S V04 10/100/1000 1G SFP Switch  picture


Discussions

No Discussions have been posted on this vulnerability.