Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@××××××××××××.org
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200503-19 ] MySQL: Multiple vulnerabilities
Date: Wed, 16 Mar 2005 15:48:27
Message-Id: 200503161648.20374.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200503-19
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: MySQL: Multiple vulnerabilities
9 Date: March 16, 2005
10 Bugs: #84819
11 ID: 200503-19
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 MySQL contains several vulnerabilities potentially leading to the
19 overwriting of local files or to the execution of arbitrary code.
20
21 Background
22 ==========
23
24 MySQL is a fast, multi-threaded, multi-user SQL database server.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 dev-db/mysql < 4.0.24 >= 4.0.24
33
34 Description
35 ===========
36
37 MySQL fails to properly validate input for authenticated users with
38 INSERT and DELETE privileges (CAN-2005-0709 and CAN-2005-0710).
39 Furthermore MySQL uses predictable filenames when creating temporary
40 files with CREATE TEMPORARY TABLE (CAN-2005-0711).
41
42 Impact
43 ======
44
45 At attacker with INSERT and DELETE privileges could exploit this to
46 manipulate the mysql table or accessing libc calls, potentially leading
47 to the execution of arbitrary code with the permissions of the user
48 running MySQL. An attacker with CREATE TEMPORARY TABLE privileges could
49 exploit this to overwrite arbitrary files via a symlink attack.
50
51 Workaround
52 ==========
53
54 There is no known workaround at this time.
55
56 Resolution
57 ==========
58
59 All MySQL users should upgrade to the latest version:
60
61 # emerge --sync
62 # emerge --ask --oneshot --verbose ">=dev-db/mysql-4.0.24"
63
64 References
65 ==========
66
67 [ 1 ] CAN-2005-0709
68 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0709
69 [ 2 ] CAN-2005-0710
70 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0710
71 [ 3 ] CAN-2005-0711
72 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0711
73
74 Availability
75 ============
76
77 This GLSA and any updates to it are available for viewing at
78 the Gentoo Security Website:
79
80 http://security.gentoo.org/glsa/glsa-200503-19.xml
81
82 Concerns?
83 =========
84
85 Security is a primary focus of Gentoo Linux and ensuring the
86 confidentiality and security of our users machines is of utmost
87 importance to us. Any security concerns should be addressed to
88 security@g.o or alternatively, you may file a bug at
89 http://bugs.gentoo.org.
90
91 License
92 =======
93
94 Copyright 2005 Gentoo Foundation, Inc; referenced text
95 belongs to its owner(s).
96
97 The contents of this document are licensed under the
98 Creative Commons - Attribution / Share Alike license.
99
100 http://creativecommons.org/licenses/by-sa/2.0