MySQL Community Server < 5.1.47 / 5.0.91 Multiple Vulnerabilities

Medium Log Correlation Engine Plugin ID 801133

Synopsis

The remote database server is vulnerable to multiple attack vectors.

Description

Versions of MySQL server earlier than 5.1.47 / 5.0.91 are potentially affected by the following vulnerabilities :

- The server may continue reading packets indefinitely if it receives a packet larger than the maximum size of one packet, which could allow an unauthenticated remote attacker to consume a high level of CPU and bandwidth. (Bug #50974)

- Using an overly long table name argument to the 'COM_FIELD_LIST' command, an authenticated user can overflow a buffer and execute arbitrary code on the affected host. (Bug #53237)

- Using a specially crafted table name argument to 'COM_FIELD_LIST', an authenticated user can bypass almost all forms of checks for privileges and table-level grants. (Bug #53371)

Solution

Upgrade to MySQL Community Server 5.0.91, 5.1.47, or later.

See Also

bugs.mysql.com/bug.php?id=50974

bugs.mysql.com/bug.php?id=53237

bugs.mysql.com/bug.php?id=53371

dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html

dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html

Plugin Details

Severity: Medium

ID: 801133

File Name: 801133.prm

Family: Database

Published: 2010/06/29

Nessus ID: 46702

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Patch Publication Date: 2010/05/06

Vulnerability Publication Date: 2010/05/12

Exploitable With

CANVAS (White_Phosphorus)

Reference Information

CVE: CVE-2010-1848, CVE-2010-1849, CVE-2010-1850

BID: 40100, 40106, 40109