MySQL Community Server < 5.1.47 / 5.0.91 Multiple Vulnerabilities

medium Log Correlation Engine Plugin ID 801133

Synopsis

The remote database server is vulnerable to multiple attack vectors.

Description

Versions of MySQL server earlier than 5.1.47 / 5.0.91 are potentially affected by the following vulnerabilities :

- The server may continue reading packets indefinitely if it receives a packet larger than the maximum size of one packet, which could allow an unauthenticated remote attacker to consume a high level of CPU and bandwidth. (Bug #50974)

- Using an overly long table name argument to the 'COM_FIELD_LIST' command, an authenticated user can overflow a buffer and execute arbitrary code on the affected host. (Bug #53237)

- Using a specially crafted table name argument to 'COM_FIELD_LIST', an authenticated user can bypass almost all forms of checks for privileges and table-level grants. (Bug #53371)

Solution

Upgrade to MySQL Community Server 5.0.91, 5.1.47, or later.

See Also

bugs.mysql.com/bug.php?id=50974

bugs.mysql.com/bug.php?id=53237

bugs.mysql.com/bug.php?id=53371

dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html

dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html

Plugin Details

Severity: Medium

ID: 801133

Family: Database

Published: 6/29/2010

Nessus ID: 46702

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Patch Publication Date: 5/6/2010

Vulnerability Publication Date: 5/12/2010

Exploitable With

CANVAS (White_Phosphorus)

Reference Information

CVE: CVE-2010-1848, CVE-2010-1849, CVE-2010-1850

BID: 40100, 40106, 40109