Executive Summary

Summary
Title MySQL vulnerability
Informations
NameUSN-440-1First vendor Publication2007-03-21
VendorUbuntuLast vendor Modification2007-03-21
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score2.1Attack RangeLocal
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
mysql-server-5.0 5.0.22-0ubuntu6.06.3

Ubuntu 6.10:
mysql-server-5.0 5.0.24a-9ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Stefan Streichbier and B. Mueller of SEC Consult discovered that MySQL
subselect queries using "ORDER BY" could be made to crash the MySQL
server. An attacker with access to a MySQL instance could cause an
intermitant denial of service.


Original Source

Url : http://www.ubuntu.com/usn/USN-440-1

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:9530
 
Oval ID: oval:org.mitre.oval:def:9530
Title: MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function.
Description: MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function.
Family: unix Class: vulnerability
Reference(s): CVE-2007-1420
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application41

OpenVAS Exploits

DateDescription
2009-04-09Name : Mandriva Update for MySQL MDKSA-2007:139 (MySQL)
File : nvt/gb_mandriva_MDKSA_2007_139.nasl
2009-03-23Name : Ubuntu Update for mysql-dfsg-5.0 vulnerability USN-440-1
File : nvt/gb_ubuntu_USN_440_1.nasl
2009-03-06Name : RedHat Update for mysql RHSA-2008:0364-01
File : nvt/gb_RHSA-2008_0364-01_mysql.nasl
2008-10-24Name : MySQL Single Row Subselect Remote DoS
File : nvt/mysql_single_row_subselect_dos.nasl
2008-09-24Name : Gentoo Security Advisory GLSA 200705-11 (MySQL)
File : nvt/glsa_200705_11.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
33974MySQL information_schema Table Subselect Single-Row DoS

Nessus® Vulnerability Scanner

DateDescription
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20080521_mysql_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-01-16Name : The remote database server allows a local user to cause a denial of service.
File : mysql_5_0_36.nasl - Type : ACT_GATHER_INFO
2008-05-22Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2008-0364.nasl - Type : ACT_GATHER_INFO
2007-11-10Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-440-1.nasl - Type : ACT_GATHER_INFO
2007-07-05Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2007-139.nasl - Type : ACT_GATHER_INFO
2007-05-10Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200705-11.nasl - Type : ACT_GATHER_INFO
2007-03-30Name : The remote database server is prone to a denial of service attack.
File : mysql_single_row_subselect_dos.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2014-02-17 12:04:16
  • Multiple Updates