This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
SecurityFocus reports :
MySQL is reported prone to an insecure temporary file creation
Reports indicate that an attacker that has 'CREATE TEMPORARY TABLE'
privileges on an affected installation may leverage this vulnerability
to corrupt files with the privileges of the MySQL process.
MySQL is reported prone to an input validation vulnerability that can
be exploited by remote users that have INSERT and DELETE privileges on
the 'mysql' administrative database.
Reports indicate that this issue may be leveraged to load an execute a
malicious library in the context of the MySQL process.
Finally, MySQL is reported prone to a remote arbitrary code execution
vulnerability. It is reported that the vulnerability may be triggered
by employing the 'CREATE FUNCTION' statement to manipulate functions
in order to control sensitive data structures.
This issue may be exploited to execute arbitrary code in the context
of the database process.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.6
CVSS Temporal Score : 3.8
Public Exploit Available : true
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 18956 (freebsd_pkg_619ef337949a11d9b81300d05964249f.nasl)
Bugtraq ID: 12781
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now