This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote database server is affected by several issues.
The version of MySQL Community Server 5.0 installed on the remote host
is before 5.0.66. Such versions are reportedly affected by the
following issues :
- When using a FEDERATED table, a local server could be
forced to crash if the remote server returns a result
with fewer columns than expected (Bug #29801).
- ALTER VIEW retains the original DEFINER value, even
when altered by another user, which could allow that
user to gain the access rights of the view (Bug
- A local user can circumvent privileges through creation
of MyISAM tables using the 'DATA DIRECTORY' and 'INDEX
DIRECTORY' options to overwrite existing table files in
the application's data directory (Bug #32167).
- RENAME TABLE against a table with DATA/INDEX DIRECTORY
overwrites the file to which the symlink points (Bug
- It was possible to force an error message of excessive
length, which could lead to a buffer overflow (Bug
- Three vulnerabilities in yaSSL versions 1.7.5 and
earlier as used in MySQL could allow an unauthenticated
remote attacker to crash the server or to execute
arbitrary code provided yaSSL is enabled and the server
allows TCP connections (Bug #33814).
- An empty bit-string literal (b'') used in a SQL statement
could result in a server crash (Bug #35658).
See also :
Upgrade to MySQL Community Server version 5.0.67.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true
Nessus Plugin ID: 34159 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now