Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
These remote packages are missing security patches :
USN-274-1 fixed a logging bypass in the MySQL server. Unfortunately it
was acertaind that the original update was not sufficient to
completely fix the vulnerability, thus another update is necessary. We
apologize for the inconvenience.
For reference, these are the details of the original USN:
A logging bypass was discovered in the MySQL query parser. A local
attacker could exploit this by inserting NUL characters into query
strings (even into comments), which would cause the query to be
This only affects you if you enabled the 'log' parameter in the
Upgrade to :
- libmysqlclient12-4.0.24-10ubuntu2.3 (Ubuntu 5.10)
- libmysqlclient12-dev-4.0.24-10ubuntu2.3 (Ubuntu 5.10)
- mysql-client-4.0.24-10ubuntu2.3 (Ubuntu 5.10)
- mysql-common-4.0.24-10ubuntu2.3 (Ubuntu 5.10)
- mysql-server-4.0.24-10ubuntu2.3 (Ubuntu 5.10)
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi
|Dell Latitude E5440 Laptop Intel Core i5-4310u 2.00GHz No HDD 8GB RAM WiFi 14"
|Dell Latitude E5440 Laptop Intel Core i5-4300u 1.90GHz 8GB RAM No HDD WiFi 14"
|10x Intel Xeon Quad-Core W3550 3.06GHz 4.8GT/s 8MB Cache LGA1366 SLBEY Processor
|ASUS ZenBook UX303UA 13.3-Inch Touchscreen Laptop, Intel Core i5, 8 GB RAM
No Discussions have been posted on this vulnerability.