How to Buy
This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote database server is affected by several issues.
The version of MySQL Community Server 5.0 installed on the remote host
is before 5.0.66. Such versions are reportedly affected by the
following issues :
- When using a FEDERATED table, a local server could be
forced to crash if the remote server returns a result
with fewer columns than expected (Bug #29801).
- ALTER VIEW retains the original DEFINER value, even
when altered by another user, which could allow that
user to gain the access rights of the view (Bug
- A local user can circumvent privileges through creation
of MyISAM tables using the 'DATA DIRECTORY' and 'INDEX
DIRECTORY' options to overwrite existing table files in
the application's data directory (Bug #32167).
- RENAME TABLE against a table with DATA/INDEX DIRECTORY
overwrites the file to which the symlink points (Bug
- It was possible to force an error message of excessive
length, which could lead to a buffer overflow (Bug
- Three vulnerabilities in yaSSL versions 1.7.5 and
earlier as used in MySQL could allow an unauthenticated
remote attacker to crash the server or to execute
arbitrary code provided yaSSL is enabled and the server
allows TCP connections (Bug #33814).
- An empty bit-string literal (b'') used in a SQL statement
could result in a server crash (Bug #35658).
See also :
Upgrade to MySQL Community Server version 5.0.67.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true
Nessus Plugin ID: 34159 ()
Bugtraq ID: 267652714029106
CVE ID: CVE-2007-5969CVE-2008-0226CVE-2008-0227CVE-2008-2079CVE-2008-3963CVE-2008-4098
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.