Scientific Linux Security Update : mysql55-mysql on SL5.x i386/x86_64 (20140218)

High Nessus Plugin ID 72569


The remote Scientific Linux host is missing one or more security updates.


A buffer overflow flaw was found in the way the MySQL command line client tool (mysql) processed excessively long version strings. If a user connected to a malicious MySQL server via the mysql client, the server could use this flaw to crash the mysql client or, potentially, execute arbitrary code as the user running the mysql client.

Upstream does not issue any more security advisories for the MySQL 5.0 packages (mysql-5.0.* and related packages).

The only trusted way to upgrade from MySQL 5.0 to MySQL 5.5 is by using MySQL 5.1 as an intermediate step. This is why the mysql51* Software Collection packages are provided. Note that the MySQL 5.1 packages are not supported and are provided only for the purposes of migrating to MySQL 5.5. You should not use the mysql51* packages on any of your production systems.

Specific instructions for this migration are provided by the upstream Deployment Guide.

After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 72569

File Name: sl_20140218_mysql55_mysql_on_SL5_x.nasl

Version: 1.4

Type: local

Agent: unix

Published: 2014/02/19

Updated: 2020/03/12

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:mysql55-mysql, p-cpe:/a:fermilab:scientific_linux:mysql55-mysql-bench, p-cpe:/a:fermilab:scientific_linux:mysql55-mysql-debuginfo, p-cpe:/a:fermilab:scientific_linux:mysql55-mysql-devel, p-cpe:/a:fermilab:scientific_linux:mysql55-mysql-libs, p-cpe:/a:fermilab:scientific_linux:mysql55-mysql-server, p-cpe:/a:fermilab:scientific_linux:mysql55-mysql-test, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2014/02/18

Vulnerability Publication Date: 2013/10/16

Reference Information

CVE: CVE-2013-3839, CVE-2013-5807, CVE-2013-5891, CVE-2013-5908, CVE-2014-0001, CVE-2014-0386, CVE-2014-0393, CVE-2014-0401, CVE-2014-0402, CVE-2014-0412, CVE-2014-0420, CVE-2014-0437