RHEL 2.1 : mysql (RHSA-2003:282)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated MySQL server packages fix a buffer overflow vulnerability.

MySQL is a multi-user, multi-threaded SQL database server.

Frank Denis reported a bug in unpatched versions of MySQL prior to
version 3.23.58. Passwords for MySQL users are stored in the Password
field of the user table. Under this bug, a Password field with a value
greater than 16 characters can cause a buffer overflow. It may be
possible for an attacker with the ability to modify the user table to
exploit this buffer overflow to execute arbitrary code as the MySQL
user. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2003-0780 to this issue.

Users of MySQL are advised to upgrade to these erratum packages
containing MySQL 3.23.58, which is not vulnerable to this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2003-0780.html
http://dev.mysql.com/doc/refman/4.1/en/news-3-23-58.html
http://dev.mysql.com/doc/refman/4.1/en/news-3-23-57.html
http://rhn.redhat.com/errata/RHSA-2003-282.html

Solution :

Update the affected mysql, mysql-devel and / or mysql-server packages.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 15652 ()

Bugtraq ID:

CVE ID: CVE-2003-0780