FreeBSD : mysql-server -- multiple remote vulnerabilities (619ef337-949a-11d9-b813-00d05964249f)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

SecurityFocus reports :

MySQL is reported prone to an insecure temporary file creation

Reports indicate that an attacker that has 'CREATE TEMPORARY TABLE'
privileges on an affected installation may leverage this vulnerability
to corrupt files with the privileges of the MySQL process.

MySQL is reported prone to an input validation vulnerability that can
be exploited by remote users that have INSERT and DELETE privileges on
the 'mysql' administrative database.

Reports indicate that this issue may be leveraged to load an execute a
malicious library in the context of the MySQL process.

Finally, MySQL is reported prone to a remote arbitrary code execution
vulnerability. It is reported that the vulnerability may be triggered
by employing the 'CREATE FUNCTION' statement to manipulate functions
in order to control sensitive data structures.

This issue may be exploited to execute arbitrary code in the context
of the database process.

See also :

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.6
CVSS Temporal Score : 3.8
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 18956 (freebsd_pkg_619ef337949a11d9b81300d05964249f.nasl)

Bugtraq ID: 12781

CVE ID: CVE-2005-0709

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now