Ubuntu Security Notice (C) 2010-2016 Canonical, Inc. / NASL script (C) 2010-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related patches.
It was discovered that MySQL did not check privileges before
uninstalling plugins. An authenticated user could uninstall arbitrary
plugins, bypassing intended restrictions. This issue only affected
Ubuntu 9.10 and 10.04 LTS. (CVE-2010-1621)
It was discovered that MySQL could be made to delete another user's
data and index files. An authenticated user could use symlinks
combined with the DROP TABLE command to possibly bypass privilege
It was discovered that MySQL incorrectly validated the table name
argument of the COM_FIELD_LIST command. An authenticated user could
use a specially- crafted table name to bypass privilege checks and
possibly access other tables. (CVE-2010-1848)
Eric Day discovered that MySQL incorrectly handled certain network
packets. A remote attacker could exploit this flaw and cause the
server to consume all available resources, resulting in a denial of
It was discovered that MySQL performed incorrect bounds checking on
the table name argument of the COM_FIELD_LIST command. An
authenticated user could use a specially crafted table name to cause a
denial of service or possibly execute arbitrary code. The default
compiler options for affected releases should reduce the vulnerability
to a denial of service. (CVE-2010-1850).
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.5
CVSS Temporal Score : 5.1
Public Exploit Available : true
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 46855 ()
Bugtraq ID: 3954340100401064010940257
CVE ID: CVE-2010-1621CVE-2010-1626CVE-2010-1848CVE-2010-1849CVE-2010-1850
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.