MySQL Community Server < 5.1.51 Multiple Vulnerabilities

medium Nessus Plugin ID 49711

Synopsis

The remote database server is affected by multiple vulnerabilities.

Description

The version of MySQL Community Server installed on the remote host is earlier than 5.1.51 and is, therefore, potentially affected by multiple vulnerabilities:

- A privilege escalation vulnerability exists when using statement-based replication. Version specific comments used on a master server with a lesser release version than its slave can allow the MySQL privilege system on the slave server to be subverted. (49124)

- An authenticated user can crash the MySQL server by passing improper WKB to the 'PolyFromWKB()' function.
(51875)

- The improper handling of type errors during argument evaluation in extreme-value functions, e.g., 'LEAST()' or 'GREATEST()' caused server crashes. (55826)

- The creation of derived tables needing a temporary grouping table caused server crashes. (55568)

- The re-evaluation of a user-variable assignment expression after the creation of a temporary table caused server crashes. (55564)

- The 'convert_tz()' function can be used to crash the server by setting the timezone argument to an empty SET column value. (55424)

- The pre-evaluation of 'LIKE' predicates while preparing a view caused server crashes. (54568)

- The use of 'GROUP_CONCAT()' and 'WITH ROLLUP' caused server crashes. (54476)

- The use of an intermediate temporary table and queries containing calls to 'GREATEST()' or 'LEAST()', having a list of both numeric and 'LONGBLOB' arguments, caused server crashes. (54461)

- The use of nested joins in prepared statements or stored procedures could result in infinite loops.
(53544)

Solution

Upgrade to MySQL Community Server 5.1.51 or later.

See Also

https://bugs.mysql.com/bug.php?id=49124

https://bugs.mysql.com/bug.php?id=51875

https://bugs.mysql.com/bug.php?id=55826

https://bugs.mysql.com/bug.php?id=55568

https://bugs.mysql.com/bug.php?id=55564

https://bugs.mysql.com/bug.php?id=54568

https://bugs.mysql.com/bug.php?id=54476

https://bugs.mysql.com/bug.php?id=54461

https://bugs.mysql.com/bug.php?id=53544

http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html

http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html

Plugin Details

Severity: Medium

ID: 49711

File Name: mysql_5_1_51.nasl

Version: 1.19

Type: remote

Family: Databases

Published: 10/5/2010

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:mysql:mysql

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/10/2010

Vulnerability Publication Date: 8/3/2010

Reference Information

CVE: CVE-2009-5026, CVE-2010-3833, CVE-2010-3834, CVE-2010-3835, CVE-2010-3836, CVE-2010-3837, CVE-2010-3838, CVE-2010-3839, CVE-2010-3840

BID: 43676, 43677

Secunia: 41716