Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200605-13 ] MySQL: Information leakage
Date: Thu, 11 May 2006 16:45:07
Message-Id: 200605111814.31273.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200605-13
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Low
8 Title: MySQL: Information leakage
9 Date: May 11, 2006
10 Bugs: #132146
11 ID: 200605-13
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A MySQL server may leak information to unauthorized users.
19
20 Background
21 ==========
22
23 MySQL is a popular multi-threaded, multi-user SQL database server.
24
25 Affected packages
26 =================
27
28 -------------------------------------------------------------------
29 Package / Vulnerable / Unaffected
30 -------------------------------------------------------------------
31 1 dev-db/mysql < 4.1.19 >= 4.1.19
32
33 Description
34 ===========
35
36 The processing of the COM_TABLE_DUMP command by a MySQL server fails to
37 properly validate packets that arrive from the client via a network
38 socket.
39
40 Impact
41 ======
42
43 By crafting specific malicious packets an attacker could gather
44 confidential information from the memory of a MySQL server process, for
45 example results of queries by other users or applications. By using PHP
46 code injection or similar techniques it would be possible to exploit
47 this flaw through web applications that use MySQL as a database
48 backend.
49
50 Note that on 5.x versions it is possible to overwrite the stack and
51 execute arbitrary code with this technique. Users of MySQL 5.x are
52 urged to upgrade to the latest available version.
53
54 Workaround
55 ==========
56
57 There is no known workaround at this time.
58
59 Resolution
60 ==========
61
62 All MySQL users should upgrade to the latest version.
63
64 # emerge --sync
65 # emerge --ask --oneshot --verbose ">=dev-db/mysql-4.1.19"
66
67 References
68 ==========
69
70 [ 1 ] Original advisory
71 http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2006-05/msg00041.html
72 [ 2 ] CVE-2006-1516
73 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516
74 [ 3 ] CVE-2006-1517
75 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517
76
77 Availability
78 ============
79
80 This GLSA and any updates to it are available for viewing at
81 the Gentoo Security Website:
82
83 http://security.gentoo.org/glsa/glsa-200605-13.xml
84
85 Concerns?
86 =========
87
88 Security is a primary focus of Gentoo Linux and ensuring the
89 confidentiality and security of our users machines is of utmost
90 importance to us. Any security concerns should be addressed to
91 security@g.o or alternatively, you may file a bug at
92 http://bugs.gentoo.org.
93
94 License
95 =======
96
97 Copyright 2006 Gentoo Foundation, Inc; referenced text
98 belongs to its owner(s).
99
100 The contents of this document are licensed under the
101 Creative Commons - Attribution / Share Alike license.
102
103 http://creativecommons.org/licenses/by-sa/2.5
104 --
105 gentoo-announce@g.o mailing list