CVE-2008-4098

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.

References

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25

http://bugs.mysql.com/bug.php?id=32167

http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html

http://secunia.com/advisories/32578

http://secunia.com/advisories/32759

http://secunia.com/advisories/32769

http://secunia.com/advisories/38517

http://ubuntu.com/usn/usn-897-1

http://www.debian.org/security/2008/dsa-1662

http://www.mandriva.com/security/advisories?name=MDVSA-2009:094

http://www.openwall.com/lists/oss-security/2008/09/09/20

http://www.openwall.com/lists/oss-security/2008/09/16/3

http://www.redhat.com/support/errata/RHSA-2009-1067.html

http://www.redhat.com/support/errata/RHSA-2010-0110.html

http://www.ubuntu.com/usn/USN-1397-1

http://www.ubuntu.com/usn/USN-671-1

https://exchange.xforce.ibmcloud.com/vulnerabilities/45649

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591

Details

Source: MITRE

Published: 2008-09-18

Updated: 2019-12-17

Type: CWE-59

Risk Information

CVSS v2

Base Score: 4.6

Vector: AV:N/AC:H/Au:S/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*

Tenable Plugins

View all (28 total)

IDNameProductFamilySeverity
80705Oracle Solaris Third-Party Patch Update : mysql (multiple_vulnerabilities_in_mysql)NessusSolaris Local Security Checks
medium
67998Oracle Linux 4 : mysql (ELSA-2010-0110)NessusOracle Linux Local Security Checks
high
67997Oracle Linux 5 : mysql (ELSA-2010-0109)NessusOracle Linux Local Security Checks
medium
63890RHEL 5 : mysql (RHSA-2009:1289)NessusRed Hat Local Security Checks
high
60736Scientific Linux Security Update : mysql on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60735Scientific Linux Security Update : mysql on SL4.x i386/x86_64NessusScientific Linux Local Security Checks
high
58325Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities (USN-1397-1)NessusUbuntu Local Security Checks
high
57446GLSA-201201-02 : MySQL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
44948CentOS 5 : mysql (CESA-2010:0109)NessusCentOS Local Security Checks
medium
44647CentOS 4 : mysql (CESA-2010:0110)NessusCentOS Local Security Checks
high
44635RHEL 4 : mysql (RHSA-2010:0110)NessusRed Hat Local Security Checks
high
44634RHEL 5 : mysql (RHSA-2010:0109)NessusRed Hat Local Security Checks
medium
44585Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities (USN-897-1)NessusUbuntu Local Security Checks
high
43782CentOS 5 : mysql (CESA-2009:1289)NessusCentOS Local Security Checks
high
43045Mandriva Linux Security Advisory : mysql (MDVSA-2009:326)NessusMandriva Local Security Checks
high
41243SuSE9 Security Update : MySQL (YOU Patch Number 12256)NessusSuSE Local Security Checks
medium
40026openSUSE Security Update : libmysqlclient-devel (libmysqlclient-devel-210)NessusSuSE Local Security Checks
medium
37299Ubuntu 6.06 LTS / 7.10 / 8.04 LTS : mysql-dfsg-5.0 vulnerabilities (USN-671-1)NessusUbuntu Local Security Checks
medium
36943Mandriva Linux Security Advisory : mysql (MDVSA-2009:094)NessusMandriva Local Security Checks
medium
35279FreeBSD : mysql -- MyISAM table privileges security bypass vulnerability for symlinked paths (738f8f9e-d661-11dd-a765-0030843d3802)NessusFreeBSD Local Security Checks
medium
35248openSUSE 10 Security Update : libmysqlclient-devel (libmysqlclient-devel-5619)NessusSuSE Local Security Checks
medium
34985openSUSE 10 Security Update : mysql (mysql-5613)NessusSuSE Local Security Checks
medium
34765SuSE 10 Security Update : MySQL (ZYPP Patch Number 5618)NessusSuSE Local Security Checks
medium
4743Oracle MySQL Enterprise Server 5.0 < 5.0.70 Privilege BypassNessus Network MonitorDatabase
medium
34727MySQL Enterprise Server 5.0 < 5.0.70 Privilege BypassNessusDatabases
medium
34700Debian DSA-1662-1 : mysql-dfsg-5.0 - authorization bypassNessusDebian Local Security Checks
medium
34159MySQL Community Server 5.0 < 5.0.67 Multiple VulnerabilitiesNessusDatabases
high
801141MySQL Enterprise Server 5.0 < 5.0.70 Privilege BypassLog Correlation EngineDatabase
medium