Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameMDVSA-2010:107First vendor Publication2010-05-25
VendorMandrivaLast vendor Modification2010-05-25
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Cvss Base Score6.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score8AuthenticationRequires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple vulnerabilities has been found and corrected in mysql:

The server failed to check the table name argument of a COM_FIELD_LIST command packet for validity and compliance to acceptable table name standards. This could be exploited to bypass almost all forms of checks for privileges and table-level grants by providing a specially crafted table name argument to COM_FIELD_LIST (CVE-2010-1848).

The server could be tricked into reading packets indefinitely if it received a packet larger than the maximum size of one packet CVE-2010-1849).

The server was susceptible to a buffer-overflow attack due to a failure to perform bounds checking on the table name argument of a COM_FIELD_LIST command packet. By sending long data for the table name, a buffer is overflown, which could be exploited by an authenticated user to inject malicious code (CVE-2010-1850).

Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been patched to correct these issues.

Original Source

Url : http://www.mandriva.com/security/advisories?name=MDVSA-2010:107

CWE : Common Weakness Enumeration

idName
CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
CWE-22Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:7210
 
Oval ID: oval:org.mitre.oval:def:7210
Title: Oracle MySQL 'COM_FIELD_LIST' Command Packet Security Bypass Vulnerability
Description: Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name.
Family: windows Class: vulnerability
Reference(s): CVE-2010-1848
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Product(s): MySQL Server 5.0
MySQL Server 5.1
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10258
 
Oval ID: oval:org.mitre.oval:def:10258
Title: Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name.
Description: Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name.
Family: unix Class: vulnerability
Reference(s): CVE-2010-1848
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7328
 
Oval ID: oval:org.mitre.oval:def:7328
Title: Oracle MySQL Malformed Packet Handling Remote Denial of Service Vulnerability
Description: The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length.
Family: windows Class: vulnerability
Reference(s): CVE-2010-1849
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Product(s): MySQL Server 5.0
MySQL Server 5.1
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6693
 
Oval ID: oval:org.mitre.oval:def:6693
Title: Oracle MySQL 'COM_FIELD_LIST' Command Buffer Overflow Vulnerability
Description: Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.
Family: windows Class: vulnerability
Reference(s): CVE-2010-1850
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Product(s): MySQL Server 5.0
MySQL Server 5.1
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22134
 
Oval ID: oval:org.mitre.oval:def:22134
Title: RHSA-2010:0442: mysql security update (Important)
Description: Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.
Family: unix Class: patch
Reference(s): RHSA-2010:0442-01
CESA-2010:0442
CVE-2010-1626
CVE-2010-1848
CVE-2010-1850
Version: 42
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): mysql
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13286
 
Oval ID: oval:org.mitre.oval:def:13286
Title: DSA-2057-1 mysql-dfsg-5.0 -- several
Description: Several vulnerabilities have been discovered in the MySQL database server. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-1626 MySQL allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command. CVE-2010-1848 MySQL failed to check the table name argument of a COM_FIELD_LIST command packet for validity and compliance to acceptable table name standards. This allows an authenticated user with SELECT privileges on one table to obtain the field definitions of any table in all other databases and potentially of other MySQL instances accessible from the server's file system. CVE-2010-1849 MySQL could be tricked to read packets indefinitely if it received a packet larger than the maximum size of one packet. This results in high CPU usage and thus denial of service conditions. CVE-2010-1850 MySQL was susceptible to a buffer-overflow attack due to a failure to perform bounds checking on the table name argument of a COM_FIELD_LIST command packet. By sending long data for the table name, a buffer is overflown, which could be exploited by an authenticated user to inject malicious code. For the stable distribution, these problems have been fixed in version 5.0.51a-24+lenny4 The testing and unstable distribution do not contain mysql-dfsg-5.0 anymore. We recommend that you upgrade your mysql-dfsg-5.0 package.
Family: unix Class: patch
Reference(s): DSA-2057-1
CVE-2010-1626
CVE-2010-1848
CVE-2010-1849
CVE-2010-1850
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): mysql-dfsg-5.0
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12968
 
Oval ID: oval:org.mitre.oval:def:12968
Title: USN-950-1 -- mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities
Description: It was discovered that MySQL did not check privileges before uninstalling plugins. An authenticated user could uninstall arbitrary plugins, bypassing intended restrictions. This issue only affected Ubuntu 9.10 and 10.04 LTS. It was discovered that MySQL could be made to delete another user�s data and index files. An authenticated user could use symlinks combined with the DROP TABLE command to possibly bypass privilege checks. It was discovered that MySQL incorrectly validated the table name argument of the COM_FIELD_LIST command. An authenticated user could use a specially- crafted table name to bypass privilege checks and possibly access other tables. Eric Day discovered that MySQL incorrectly handled certain network packets. A remote attacker could exploit this flaw and cause the server to consume all available resources, resulting in a denial of service. It was discovered that MySQL performed incorrect bounds checking on the table name argument of the COM_FIELD_LIST command. An authenticated user could use a specially-crafted table name to cause a denial of service or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service
Family: unix Class: patch
Reference(s): USN-950-1
CVE-2010-1621
CVE-2010-1626
CVE-2010-1848
CVE-2010-1849
CVE-2010-1850
Version: 5
Platform(s): Ubuntu 8.04
Ubuntu 10.04
Ubuntu 9.10
Ubuntu 6.06
Ubuntu 9.04
Product(s): mysql-dfsg-5.0
mysql-dfsg-5.1
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11765
 
Oval ID: oval:org.mitre.oval:def:11765
Title: DSA-2057 mysql-dfsg-5.0 -- several vulnerabilities
Description: Several vulnerabilities have been discovered in the MySQL database server. The Common Vulnerabilities and Exposures project identifies the following problems: MySQL allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command. MySQL failed to check the table name argument of a COM_FIELD_LIST command packet for validity and compliance to acceptable table name standards. This allows an authenticated user with SELECT privileges on one table to obtain the field definitions of any table in all other databases and potentially of other MySQL instances accessible from the server's file system. MySQL could be tricked to read packets indefinitely if it received a packet larger than the maximum size of one packet. This results in high CPU usage and thus denial of service conditions. MySQL was susceptible to a buffer-overflow attack due to a failure to perform bounds checking on the table name argument of a COM_FIELD_LIST command packet. By sending long data for the table name, a buffer is overflown, which could be exploited by an authenticated user to inject malicious code.
Family: unix Class: patch
Reference(s): DSA-2057
CVE-2010-1626
CVE-2010-1848
CVE-2010-1849
CVE-2010-1850
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): mysql-dfsg-5.0
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10846
 
Oval ID: oval:org.mitre.oval:def:10846
Title: Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.
Description: Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.
Family: unix Class: vulnerability
Reference(s): CVE-2010-1850
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23130
 
Oval ID: oval:org.mitre.oval:def:23130
Title: ELSA-2010:0442: mysql security update (Important)
Description: Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.
Family: unix Class: patch
Reference(s): ELSA-2010:0442-01
CVE-2010-1626
CVE-2010-1848
CVE-2010-1850
Version: 17
Platform(s): Oracle Linux 5
Product(s): mysql
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application99

OpenVAS Exploits

DateDescription
2012-03-16Name : Ubuntu Update for mysql-5.1 USN-1397-1
File : nvt/gb_ubuntu_USN_1397_1.nasl
2012-02-12Name : Gentoo Security Advisory GLSA 201201-02 (MySQL)
File : nvt/glsa_201201_02.nasl
2011-09-07Name : Mac OS X v10.6.4 Multiple Vulnerabilities (2010-007)
File : nvt/gb_macosx_su10-007.nasl
2011-08-09Name : CentOS Update for mysql CESA-2010:0442 centos5 i386
File : nvt/gb_CESA-2010_0442_mysql_centos5_i386.nasl
2010-11-16Name : RedHat Update for mysql RHSA-2010:0824-01
File : nvt/gb_RHSA-2010_0824-01_mysql.nasl
2010-11-16Name : CentOS Update for mysql CESA-2010:0824 centos4 i386
File : nvt/gb_CESA-2010_0824_mysql_centos4_i386.nasl
2010-10-19Name : Fedora Update for mysql FEDORA-2010-15166
File : nvt/gb_fedora_2010_15166_mysql_fc13.nasl
2010-08-06Name : Fedora Update for mysql FEDORA-2010-11126
File : nvt/gb_fedora_2010_11126_mysql_fc12.nasl
2010-07-30Name : Fedora Update for mysql FEDORA-2010-11135
File : nvt/gb_fedora_2010_11135_mysql_fc13.nasl
2010-06-11Name : MySQL Multiple Vulnerabilities
File : nvt/gb_mysql_mult_vuln.nasl
2010-06-11Name : Fedora Update for mysql FEDORA-2010-9016
File : nvt/gb_fedora_2010_9016_mysql_fc13.nasl
2010-06-11Name : Fedora Update for mysql FEDORA-2010-9053
File : nvt/gb_fedora_2010_9053_mysql_fc12.nasl
2010-06-11Name : Fedora Update for mysql FEDORA-2010-9061
File : nvt/gb_fedora_2010_9061_mysql_fc11.nasl
2010-06-11Name : Ubuntu Update for MySQL vulnerabilities USN-950-1
File : nvt/gb_ubuntu_USN_950_1.nasl
2010-06-10Name : Debian Security Advisory DSA 2057-1 (mysql-dfsg-5.0)
File : nvt/deb_2057_1.nasl
2010-05-28Name : Mandriva Update for mysql MDVSA-2010:107 (mysql)
File : nvt/gb_mandriva_MDVSA_2010_107.nasl
2010-05-28Name : RedHat Update for mysql RHSA-2010:0442-01
File : nvt/gb_RHSA-2010_0442-01_mysql.nasl
2010-05-27Name : MySQL < 5.1.47 Multiple Vulnerabilities
File : nvt/gb_mysql_5_1_47.nasl
2010-05-19Name : Oracle MySQL 'COM_FIELD_LIST' Command Buffer Overflow Vulnerability
File : nvt/gb_mysql_40106.nasl
2010-03-22Name : Mandriva Update for pulseaudio MDVA-2010:107 (pulseaudio)
File : nvt/gb_mandriva_MDVA_2010_107.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
64588MySQL Large Packet Infinite Read DoS
64587MySQL COM_FIELD_LIST Command Packet Table Name Argument Overflow
64586MySQL COM_FIELD_LIST Command Packet Authentication Bypass

Snort® IPS/IDS

DateDescription
2014-01-10Database COM_FIELD_LIST Buffer Overflow attempt
RuleID : 16703 - Revision : 6 - Type : SERVER-MYSQL

Nessus® Vulnerability Scanner

DateDescription
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2010-0442.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2010-0824.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-0127.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20100526_mysql_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20101103_mysql_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2012-03-13Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1397-1.nasl - Type : ACT_GATHER_INFO
2012-02-15Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2012-0127.nasl - Type : ACT_GATHER_INFO
2012-02-14Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0127.nasl - Type : ACT_GATHER_INFO
2012-01-06Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201201-02.nasl - Type : ACT_GATHER_INFO
2010-12-02Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_libmysqlclient-devel-100930.nasl - Type : ACT_GATHER_INFO
2010-11-24Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2010-0824.nasl - Type : ACT_GATHER_INFO
2010-11-10Name : The remote host is missing a Mac OS X update that fixes various security issues.
File : macosx_10_6_5.nasl - Type : ACT_GATHER_INFO
2010-11-10Name : The remote host is missing a Mac OS X update that fixes security issues.
File : macosx_SecUpd2010-007.nasl - Type : ACT_GATHER_INFO
2010-11-09Name : The remote SuSE 9 host is missing a security-related patch.
File : suse9_12661.nasl - Type : ACT_GATHER_INFO
2010-11-04Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0824.nasl - Type : ACT_GATHER_INFO
2010-10-18Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_mysql-7172.nasl - Type : ACT_GATHER_INFO
2010-10-18Name : The remote openSUSE host is missing a security update.
File : suse_11_2_libmysqlclient-devel-101006.nasl - Type : ACT_GATHER_INFO
2010-10-18Name : The remote openSUSE host is missing a security update.
File : suse_11_1_libmysqlclient-devel-100930.nasl - Type : ACT_GATHER_INFO
2010-07-01Name : The remote Fedora host is missing a security update.
File : fedora_2010-9016.nasl - Type : ACT_GATHER_INFO
2010-07-01Name : The remote Fedora host is missing a security update.
File : fedora_2010-9053.nasl - Type : ACT_GATHER_INFO
2010-07-01Name : The remote Fedora host is missing a security update.
File : fedora_2010-9061.nasl - Type : ACT_GATHER_INFO
2010-06-10Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-950-1.nasl - Type : ACT_GATHER_INFO
2010-06-08Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2057.nasl - Type : ACT_GATHER_INFO
2010-06-01Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2010-0442.nasl - Type : ACT_GATHER_INFO
2010-05-27Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0442.nasl - Type : ACT_GATHER_INFO
2010-05-26Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2010-107.nasl - Type : ACT_GATHER_INFO
2010-05-24Name : The remote database server is affected by multiple vulnerabilities.
File : mysql_5_1_47.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2014-02-17 11:41:30
  • Multiple Updates