Scientific Linux Security Update : mysql55-mysql on SL5.x i386/x86_64 (20140218)

high Nessus Plugin ID 72569


The remote Scientific Linux host is missing one or more security updates.


A buffer overflow flaw was found in the way the MySQL command line client tool (mysql) processed excessively long version strings. If a user connected to a malicious MySQL server via the mysql client, the server could use this flaw to crash the mysql client or, potentially, execute arbitrary code as the user running the mysql client.

Upstream does not issue any more security advisories for the MySQL 5.0 packages (mysql-5.0.* and related packages).

The only trusted way to upgrade from MySQL 5.0 to MySQL 5.5 is by using MySQL 5.1 as an intermediate step. This is why the mysql51* Software Collection packages are provided. Note that the MySQL 5.1 packages are not supported and are provided only for the purposes of migrating to MySQL 5.5. You should not use the mysql51* packages on any of your production systems.

Specific instructions for this migration are provided by the upstream Deployment Guide.

After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 72569

File Name: sl_20140218_mysql55_mysql_on_SL5_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 2/19/2014

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:mysql55-mysql, p-cpe:/a:fermilab:scientific_linux:mysql55-mysql-bench, p-cpe:/a:fermilab:scientific_linux:mysql55-mysql-debuginfo, p-cpe:/a:fermilab:scientific_linux:mysql55-mysql-devel, p-cpe:/a:fermilab:scientific_linux:mysql55-mysql-libs, p-cpe:/a:fermilab:scientific_linux:mysql55-mysql-server, p-cpe:/a:fermilab:scientific_linux:mysql55-mysql-test, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2/18/2014

Vulnerability Publication Date: 10/16/2013

Reference Information

CVE: CVE-2013-3839, CVE-2013-5807, CVE-2013-5891, CVE-2013-5908, CVE-2014-0001, CVE-2014-0386, CVE-2014-0393, CVE-2014-0401, CVE-2014-0402, CVE-2014-0412, CVE-2014-0420, CVE-2014-0437