Executive Summary

Summary
Title mysql vulnerabilities
Informations
Name USN-32-1 First vendor Publication 2004-11-25
Vendor Ubuntu Last vendor Modification 2004-11-25
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:

mysql-server

The problem can be corrected by upgrading the affected package to version 4.0.20-2ubuntu1.1. In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

Several vulnerabilities have been discovered in the MySQL database server.

Lukasz Wojtow discovered a potential buffer overflow in the function mysql_real_connect(). A malicious name server could send specially crafted DNS packages which might result in execution of arbitrary code with the database server's privileges. However, it is believed that this bug cannot be exploited with the C Standard library (glibc) that Ubuntu uses. (CAN-2004-0836).

Dean Ellis noticed a flaw that allows an authorized MySQL user to cause a denial of service (crash or hang) via concurrent execution of certain statements (ALTER TABLE ... UNION=, FLUSH TABLES) on tables of type MERGE (CAN-2004-0837)

Some query strings containing a double quote (like MATCH ... AGAINST (' some " query' IN BOOLEAN MODE) ) that did not have a matching closing double quote caused a denial of service (server crash). Again, this is only exploitable by authorized mysql users. (CAN-2004-0956)

If a user was granted privileges to a database with a name containing an underscore ("_"), the user also gained the ability to grant privileges to other databases with similar names. (CAN-2004-0957)

Original Source

Url : http://www.ubuntu.com/usn/USN-32-1

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-15 Command Delimiters

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3
Application 104
Os 1
Os 3
Os 1
Os 7
Os 3
Os 2

OpenVAS Exploits

Date Description
2009-10-10 Name : SLES9: Security update for MySQL
File : nvt/sles9p5015996.nasl
2009-10-10 Name : SLES9: Security update for MySQL
File : nvt/sles9p5020865.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200410-22 (MySQL)
File : nvt/glsa_200410_22.nasl
2008-09-04 Name : FreeBSD Ports: mysql-server
File : nvt/freebsd_mysql-server0.nasl
2008-09-04 Name : FreeBSD Ports: mysql-server
File : nvt/freebsd_mysql-server1.nasl
2008-09-04 Name : FreeBSD Ports: mysql-server
File : nvt/freebsd_mysql-server2.nasl
2008-09-04 Name : FreeBSD Ports: mysql-server
File : nvt/freebsd_mysql-server3.nasl
2008-01-17 Name : Debian Security Advisory DSA 562-1 (mysql)
File : nvt/deb_562_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 707-1 (mysql)
File : nvt/deb_707_1.nasl
2005-11-03 Name : MySQL buffer overflow
File : nvt/mysql_buff_overflow.nasl
2005-11-03 Name : MySQL multiple flaws (2)
File : nvt/mysql_multiple_flaws2.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
10985 MySQL MATCH..AGAINST Query DoS

10959 MySQL GRANT ALL ON Privilege Escalation

MySQL contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when that users is given GRANT privileges on a database whose name contains an underscore, i.e. database_name. The underscore is treated as a wildcard; continuing the example, the user would then have GRANT privileges on database1name, databaseZname, etc. This flaw may lead to a loss of confidentiality and/or integrity.
10659 MySQL ALTER MERGE Tables to Change the UNION DoS

MySQL contains a flaw that may allow a remote denial of service. The issue is triggered when an attacker uses multiple threads to ALTER the same or different MERGE tables in order to change the UNION., and will result in loss of availability for the server.
10658 MySQL mysql_real_connect() Function Remote Overflow

A remote overflow exists in MySQL. MySQL fails to perform proper bounds checking on the 'mysql_real_connect' function resulting in a buffer overflow. With a specially crafted request, an attacker may cause a remote buffer overflow resulting in a loss of confidentiality and/or integrity.

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft MSN Messenger png overflow
RuleID : 3130-community - Revision : 8 - Type : PUA-OTHER
2014-01-10 Microsoft MSN Messenger png overflow
RuleID : 3130 - Revision : 8 - Type : PUA-OTHER

Nessus® Vulnerability Scanner

Date Description
2006-01-15 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-32-1.nasl - Type : ACT_GATHER_INFO
2006-01-15 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-109-1.nasl - Type : ACT_GATHER_INFO
2005-08-18 Name : The remote host is missing Sun Security Patch number 120293-02
File : solaris10_x86_120293.nasl - Type : ACT_GATHER_INFO
2005-08-18 Name : The remote host is missing Sun Security Patch number 120292-02
File : solaris10_120292.nasl - Type : ACT_GATHER_INFO
2005-07-13 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_01c231cd439311d98bb900065be4b5b6.nasl - Type : ACT_GATHER_INFO
2005-07-13 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_06a6b2cf484b11d9813c00065be4b5b6.nasl - Type : ACT_GATHER_INFO
2005-07-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_29edd807438d11d98bb900065be4b5b6.nasl - Type : ACT_GATHER_INFO
2005-07-13 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_835256b846ed11d98ce000065be4b5b6.nasl - Type : ACT_GATHER_INFO
2005-04-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-707.nasl - Type : ACT_GATHER_INFO
2005-04-13 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2005-070.nasl - Type : ACT_GATHER_INFO
2004-12-09 Name : The remote Fedora Core host is missing a security update.
File : fedora_2004-530.nasl - Type : ACT_GATHER_INFO
2004-11-10 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-562.nasl - Type : ACT_GATHER_INFO
2004-11-04 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2004-611.nasl - Type : ACT_GATHER_INFO
2004-11-02 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2004-119.nasl - Type : ACT_GATHER_INFO
2004-10-25 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200410-22.nasl - Type : ACT_GATHER_INFO
2004-10-21 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2004-569.nasl - Type : ACT_GATHER_INFO
2004-10-21 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2004-597.nasl - Type : ACT_GATHER_INFO
2004-10-17 Name : The remote database server is affected by multiple vulnerabilities.
File : mysql_multiple_flaws3.nasl - Type : ACT_GATHER_INFO
2004-10-11 Name : The remote database server is affected by multiple vulnerabilities.
File : mysql_multiple_flaws2.nasl - Type : ACT_GATHER_INFO
2004-08-20 Name : The remote database server is affected by a remote code execution vulnerability.
File : mysql_buff_overflow.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 12:03:38
  • Multiple Updates
2013-05-11 12:25:32
  • Multiple Updates