|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200410-22] MySQL: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200410-22] MySQL: Multiple vulnerabilities |
||
MySQL: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200410-22 (MySQL: Multiple vulnerabilities) The following vulnerabilities were found and fixed in MySQL: Oleksandr Byelkin found that ALTER TABLE ... RENAME checks CREATE/INSERT rights of the old table instead of the new one (CVE-2004-0835). Another privilege checking bug permited users to grant rights on a database they had no rights on. Dean Ellis found a defect where multiple threads ALTERing the MERGE tables to change the UNION could cause the server to crash (CVE-2004-0837). Another crash was found in MATCH ... AGAINST() queries with missing closing double quote. Finally, a buffer overrun in the mysql_real_connect function was found by Lukasz Wojtow (CVE-2004-0836). Impact The privilege checking issues could be used by remote users to bypass their rights on databases. The two crashes issues could be exploited by a remote user to perform a Denial of Service attack on MySQL server. The buffer overrun issue could also be exploited as a Denial of Service attack, and may permit to execute arbitrary code with the rights of the MySQL daemon (typically, the "mysql" user). Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 http://bugs.mysql.com/bug.php?id=3933 http://bugs.mysql.com/bug.php?id=3870 Solution: All MySQL users should upgrade to the latest version: # emerge sync # emerge -pv ">=dev-db/mysql-4.0.21" # emerge ">=dev-db/mysql-4.0.21" Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
Dell PowerEdge R720 Server - 2x8c CPU,256Gb RAM, 128Gb SSD/3x900Gb SAS, Proxmox
$340.00
Supermicro 4U 36 Bay Storage Server 2.4Ghz 8-C 128GB 1x1280W Rails TrueNAS ZFS
$712.98
CSE-118 Supermicro 1U 3x GPU Server 2.6Ghz 20-C 128GB CX353A 2x1600W PSU Rails
$454.03
DELL PowerEdge R730XD 24x 2.5" Server Dual 750W Dual Heatsink - BareBones TESTED
$269.99
Intel Xeon E5-2680 v4 2.4GHz 35MB 14-Core 120W LGA2011-3 SR2N7
$17.99
Intel Xeon Gold 6140 SR3AX 2.3GHz 18-Core Processor CPU
$39.99
Intel Xeon E5-2697A V4 2.6GHz CPU Processor 16-Core Socket LGA2011 SR2K1
$39.99
Intel Xeon Gold 6138 2.0GHz 27.5MB 20-Core 125W LGA3647 SR3B5
$46.00
HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram Dual 256GB SSD K420 Linux GA
$234.98
Rare WaterCooled HP Z800 Workstation Dual Xeon X5680 16GB RAM 120GB SSD Nvidia
$279.56
|
||
No Discussions have been posted on this vulnerability. |