Nessus Plugin #15140

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

[DSA303] DSA-303-1 mysql

Family:
Debian Local Security Checks
Category:
infos
Copyright:
This script is (C) 2004 Michel Arboi
Summary:
DSA-303-1 mysql
Version:
$Revision: 1.4 $
Cve_id:
CAN-2003-0073, CAN-2003-0150
Bugtraq_id:
7052
Xrefs:
DSA:303
Description:

CAN-2003-0073: The mysql package contains a bug whereby dynamically
allocated memory is freed more than once, which could be deliberately
triggered by an attacker to cause a crash, resulting in a denial of
service condition. In order to exploit this vulnerability, a valid
username and password combination for access to the MySQL server is
required.
CAN-2003-0150: The mysql package contains a bug whereby a malicious
user, granted certain permissions within mysql, could create a
configuration file which would cause the mysql server to run as root,
or any other user, rather than the mysql user.
For the stable distribution (woody) both problems have been fixed in
version 3.23.49-8.4.
The old stable distribution (potato) is only affected by
CAN-2003-0150, and this has been fixed in version 3.22.32-6.4.
For the unstable distribution (sid), CAN-2003-0073 was fixed in
version 4.0.12-2, and CAN-2003-0150 will be fixed soon.
We recommend that you update your mysql package.


Solution : http://www.debian.org/security/2003/dsa-303
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.