RHEL 2.1 : mysql (RHSA-2004:597)

critical Nessus Plugin ID 15536

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated mysql packages that fix various security issues, as well as a number of bugs, are now available for Red Hat Enterprise Linux 2.1.

MySQL is a multi-user, multi-threaded SQL database server.

A number security issues that affect the mysql server have been reported :

Oleksandr Byelkin discovered that 'ALTER TABLE ... RENAME' checked the CREATE/INSERT rights of the old table instead of the new one. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0835 to this issue.

Lukasz Wojtow discovered a buffer overrun in the mysql_real_connect function. In order to exploit this issue an attacker would need to force the use of a malicious DNS server (CVE-2004-0836).

Dean Ellis discovered that multiple threads ALTERing the same (or different) MERGE tables to change the UNION could cause the server to crash or stall (CVE-2004-0837).

Sergei Golubchik discovered that if a user is granted privileges to a database with a name containing an underscore ('_'), the user also gains the ability to grant privileges to other databases with similar names (CVE-2004-0957).

Additionally, the following minor temporary file vulnerabilities were discovered :

- Stan Bubroski and Shaun Colley found a temporary file vulnerability in the mysqlbug script (CVE-2004-0381). - A temporary file vulnerability was discovered in mysqld_multi (CVE-2004-0388). - Jeroen van Wolffelaar discovered an temporary file vulnerability in the mysqlhotcopy script when using the scp method (CVE-2004-0457).

All users of mysql should upgrade to these updated packages, which resolve these issues and also include fixes for a number of small bugs.

Solution

Update the affected mysql, mysql-devel and / or mysql-server packages.

See Also

https://access.redhat.com/security/cve/cve-2004-0381

https://access.redhat.com/security/cve/cve-2004-0388

https://access.redhat.com/security/cve/cve-2004-0457

https://access.redhat.com/security/cve/cve-2004-0835

https://access.redhat.com/security/cve/cve-2004-0836

https://access.redhat.com/security/cve/cve-2004-0837

https://access.redhat.com/security/cve/cve-2004-0957

https://access.redhat.com/errata/RHSA-2004:597

Plugin Details

Severity: Critical

ID: 15536

File Name: redhat-RHSA-2004-597.nasl

Version: 1.29

Type: local

Agent: unix

Published: 10/21/2004

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:mysql, p-cpe:/a:redhat:enterprise_linux:mysql-devel, p-cpe:/a:redhat:enterprise_linux:mysql-server, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/20/2004

Vulnerability Publication Date: 5/4/2004

Reference Information

CVE: CVE-2004-0381, CVE-2004-0388, CVE-2004-0457, CVE-2004-0835, CVE-2004-0836, CVE-2004-0837, CVE-2004-0957

RHSA: 2004:597

CWE: 119