Package : mysql Vulnerability : several Problem-Type : remote Debian-specific: no CVE ID : CAN-2004-0957 BugTraq ID : 12781 Debian Bug : 285276 296674 300158
Several vulnerabilities have been discovered in MySQL, a popular database. The Common Vulnerabilities and Exposures project identifies the following problems:
Sergei Golubchik discovered a problem in the access handling for similar named databases. If a user is granted privileges to a database with a name containing an underscore ("_"), the user also gains privileges to other databases with similar names.
Stefano Di Paola discovered that MySQL allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls.
Stefano Di Paola discovered that MySQL allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table.
Stefano Di Paola discovered that MySQL uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.
For the stable distribution (woody) these problems have been fixed in version 3.23.49-8.11.
For the unstable distribution (sid) these problems have been fixed in version 4.0.24-5 of mysql-dfsg and in version 4.1.10a-6 of mysql-dfsg-4.1.
We recommend that you upgrade your mysql packages.
Upgrade Instructions ---------------------
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody ---------------------------------