How to Buy
This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
A buffer overflow flaw was found in the way the MySQL command line
client tool (mysql) processed excessively long version strings. If a
user connected to a malicious MySQL server via the mysql client, the
server could use this flaw to crash the mysql client or, potentially,
execute arbitrary code as the user running the mysql client.
Upstream does not issue any more security advisories for the MySQL 5.0
packages (mysql-5.0.* and related packages).
The only trusted way to upgrade from MySQL 5.0 to MySQL 5.5 is by
using MySQL 5.1 as an intermediate step. This is why the mysql51*
Software Collection packages are provided. Note that the MySQL 5.1
packages are not supported and are provided only for the purposes of
migrating to MySQL 5.5. You should not use the mysql51* packages on
any of your production systems.
Specific instructions for this migration are provided by the upstream
After installing this update, the MySQL server daemon (mysqld) will be
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 72569 ()
CVE ID: CVE-2013-3839CVE-2013-5807CVE-2013-5891CVE-2013-5908CVE-2014-0001CVE-2014-0386CVE-2014-0393CVE-2014-0401CVE-2014-0402CVE-2014-0412CVE-2014-0420CVE-2014-0437
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.