Debian DSA-1073-1 : mysql-dfsg-4.1 - several vulnerabilities

medium Nessus Plugin ID 22615

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in MySQL, a popular SQL database. The Common Vulnerabilities and Exposures Project identifies the following problems :

- CVE-2006-0903 Improper handling of SQL queries containing the NULL character allows local users to bypass logging mechanisms.

- CVE-2006-1516 Usernames without a trailing null byte allow remote attackers to read portions of memory.

- CVE-2006-1517 A request with an incorrect packet length allows remote attackers to obtain sensitive information.

- CVE-2006-1518 Specially crafted request packets with invalid length values allow the execution of arbitrary code.

The following vulnerability matrix shows which version of MySQL in which distribution has this problem fixed :

woody sarge sid mysql 3.23.49-8.15 n/a n/a mysql-dfsg n/a 4.0.24-10sarge2 n/a mysql-dfsg-4.1 n/a 4.1.11a-4sarge3 n/a mysql-dfsg-5.0 n/a n/a 5.0.21-3

Solution

Upgrade the mysql packages.

See Also

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=366043

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=366048

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=366162

https://security-tracker.debian.org/tracker/CVE-2006-0903

https://security-tracker.debian.org/tracker/CVE-2006-1516

https://security-tracker.debian.org/tracker/CVE-2006-1517

https://security-tracker.debian.org/tracker/CVE-2006-1518

http://www.debian.org/security/2006/dsa-1073

Plugin Details

Severity: Medium

ID: 22615

File Name: debian_DSA-1073.nasl

Version: 1.21

Type: local

Agent: unix

Published: 10/14/2006

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:mysql-dfsg-4.1, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/22/2006

Vulnerability Publication Date: 2/25/2006

Reference Information

CVE: CVE-2006-0903, CVE-2006-1516, CVE-2006-1517, CVE-2006-1518

BID: 16850, 17780

CERT: 602457

DSA: 1073