MySQL Community Server < 5.1.51 Multiple Vulnerabilities

medium Nessus Plugin ID 49711
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 6.7

Synopsis

The remote database server is affected by multiple vulnerabilities.

Description

The version of MySQL Community Server installed on the remote host is earlier than 5.1.51 and is, therefore, potentially affected by multiple vulnerabilities:

- A privilege escalation vulnerability exists when using statement-based replication. Version specific comments used on a master server with a lesser release version than its slave can allow the MySQL privilege system on the slave server to be subverted. (49124)

- An authenticated user can crash the MySQL server by passing improper WKB to the 'PolyFromWKB()' function.
(51875)

- The improper handling of type errors during argument evaluation in extreme-value functions, e.g., 'LEAST()' or 'GREATEST()' caused server crashes. (55826)

- The creation of derived tables needing a temporary grouping table caused server crashes. (55568)

- The re-evaluation of a user-variable assignment expression after the creation of a temporary table caused server crashes. (55564)

- The 'convert_tz()' function can be used to crash the server by setting the timezone argument to an empty SET column value. (55424)

- The pre-evaluation of 'LIKE' predicates while preparing a view caused server crashes. (54568)

- The use of 'GROUP_CONCAT()' and 'WITH ROLLUP' caused server crashes. (54476)

- The use of an intermediate temporary table and queries containing calls to 'GREATEST()' or 'LEAST()', having a list of both numeric and 'LONGBLOB' arguments, caused server crashes. (54461)

- The use of nested joins in prepared statements or stored procedures could result in infinite loops.
(53544)

Solution

Upgrade to MySQL Community Server 5.1.51 or later.

See Also

http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html

http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html

https://bugs.mysql.com/bug.php?id=51875

https://bugs.mysql.com/bug.php?id=53544

https://bugs.mysql.com/bug.php?id=54461

https://bugs.mysql.com/bug.php?id=54476

https://bugs.mysql.com/bug.php?id=54568

https://bugs.mysql.com/bug.php?id=55564

https://bugs.mysql.com/bug.php?id=55568

https://bugs.mysql.com/bug.php?id=55826

https://bugs.mysql.com/bug.php?id=49124

Plugin Details

Severity: Medium

ID: 49711

File Name: mysql_5_1_51.nasl

Version: 1.19

Type: remote

Family: Databases

Published: 10/5/2010

Updated: 11/15/2018

Dependencies: mysql_version.nasl, mysql_login.nasl

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

VPR Score: 6.7

CVSS v2.0

Base Score: 6

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/10/2010

Vulnerability Publication Date: 8/3/2010

Reference Information

CVE: CVE-2010-3833, CVE-2010-3835, CVE-2010-3836, CVE-2010-3837, CVE-2010-3838, CVE-2010-3839, CVE-2010-3840, CVE-2010-3834, CVE-2009-5026

BID: 43676, 43677

Secunia: 41716