The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


CSSA-2001-006.0 MySQL buffer overflow


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Mon, 29 Jan 2001 11:04:33 -0700
From: Caldera Support Info <sup-info@LOCUTUS4.CALDERASYSTEMS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
Subject: CSSA-2001-006.0  MySQL buffer overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________
		   Caldera Systems, Inc.  Security Advisory

Subject:		MySQL buffer overflow
Advisory number: 	CSSA-2001-006.0
Issue date: 		2001 January, 29
Cross reference:
______________________________________________________________________________


1. Problem Description

   There is a buffer overflow in the MySQL server that allows
   an attacker to gain access to the mysql account. A valid mysql account
   is required for this attack. An exploit for this problem has been
   published on bugtraq.

   Note that a second vulnerability is currently being discussed
   on various mailing lists relating to the SHOW GRANTS command.
   This command is not supported in MySQL versions currently shipped
   by Caldera, so this second vulnerability does not affect OpenLinux.

2. Vulnerable Versions

   System                       Package
   -----------------------------------------------------------
   OpenLinux eDesktop 2.3.1     All packages previous to
   				mysql-3.22.32-3S
   OpenLinux eDesktop 2.4       All packages previous to
   				mysql-3.22.32-3

   OpenLinux Desktop 2.3 is not affected.

3. Solution

   Workaround

     none

   The proper solution is to upgrade to the latest packages.

4. OpenLinux eServer 2.3.1 and OpenLinux eBuilder for ECential 3.0

   4.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/

       The corresponding source code package can be found at:

       ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS

   4.2 Verification

       940afe2a243e2c568aef4dddbbb56a41  RPMS/mysql-3.22.32-3S.i386.rpm
       6930d7617efe5aedd759ccf7271198b6  RPMS/mysql-bench-3.22.32-3S.i386.rpm
       d1cf0ed011437ad97cc9beef06b67398  RPMS/mysql-client-3.22.32-3S.i386.rpm
       d766bdb5d048e219d0897d4ea73f7b1b  RPMS/mysql-devel-3.22.32-3S.i386.rpm
       dbf7d36a5860386ab5f48fe32004aa28  SRPMS/mysql-3.22.32-3S.src.rpm

   4.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

          rpm -F mysql-devel-3.22.32-3S.i386.rpm
          rpm -F mysql-bench-3.22.32-3S.i386.rpm
          rpm -F --force mysql-client-3.22.32-3S.i386.rpm
          rpm -F mysql-3.22.32-3S.i386.rpm

5. OpenLinux eDesktop 2.4

   5.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/

       The corresponding source code package can be found at:

       ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS

   5.2 Verification

       fb5d46fc477ec41919d915461a4e2198  RPMS/mysql-3.22.32-3.i386.rpm
       845ce2c207ba9d2256c34e1d6bf078f0  RPMS/mysql-bench-3.22.32-3.i386.rpm
       63ea2d09208015029c2f6886b1a27f42  RPMS/mysql-client-3.22.32-3.i386.rpm
       af4b2e3d7b8108b19060bfe9059a33d2  RPMS/mysql-devel-3.22.32-3.i386.rpm
       55deea47b0e5c259e8ef6ea6f6dd8dc8  SRPMS/mysql-3.22.32-3.src.rpm

   5.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

          rpm -F mysql-devel-3.22.32-3.i386.rpm
          rpm -F mysql-bench-3.22.32-3.i386.rpm
          rpm -F --force mysql-client-3.22.32-3.i386.rpm
          rpm -F mysql-3.22.32-3.i386.rpm

6. References

   This and other Caldera security resources are located at:

   http://www.calderasystems.com/support/security/index.html

   This security fix closes Caldera's internal Problem Report 8889.

7. Disclaimer

   Caldera Systems, Inc. is not responsible for the misuse of any of the
   information we provide on this website and/or through our security
   advisories. Our advisories are a service to our customers intended to
   promote secure installation and use of Caldera OpenLinux.

______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6dTJ+18sy83A/qfwRAmN7AJwOTpyi9dctOp8tuYHfsCcfLcIg4wCdFLCA
IPOtZB9Khg0RfzILB5G6Ctc=
=pd27
-----END PGP SIGNATURE-----

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру