Debian DSA-303-1 : mysql - privilege escalation

high Nessus Plugin ID 15140

Synopsis

The remote Debian host is missing a security-related update.

Description

CAN-2003-0073: The mysql package contains a bug whereby dynamically allocated memory is freed more than once, which could be deliberately triggered by an attacker to cause a crash, resulting in a denial of service condition. In order to exploit this vulnerability, a valid username and password combination for access to the MySQL server is required.

CAN-2003-0150: The mysql package contains a bug whereby a malicious user, granted certain permissions within mysql, could create a configuration file which would cause the mysql server to run as root, or any other user, rather than the mysql user.

Solution

For the stable distribution (woody) both problems have been fixed in version 3.23.49-8.4.

The old stable distribution (potato) is only affected by CAN-2003-0150, and this has been fixed in version 3.22.32-6.4.

We recommend that you update your mysql package.

See Also

http://www.debian.org/security/2003/dsa-303

Plugin Details

Severity: High

ID: 15140

File Name: debian_DSA-303.nasl

Version: 1.21

Type: local

Agent: unix

Published: 9/29/2004

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:mysql, cpe:/o:debian:debian_linux:2.2, cpe:/o:debian:debian_linux:3.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/15/2003

Reference Information

CVE: CVE-2003-0073, CVE-2003-0150

BID: 7052

DSA: 303