RHEL 5 : mysql55-mysql (RHSA-2014:0186)

medium Nessus Plugin ID 72568

Synopsis

The remote Red Hat host is missing one or more security updates for mysql55-mysql.

Description

The remote Redhat Enterprise Linux 5 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2014:0186 advisory.

MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.

This update fixes several vulnerabilities in the MySQL database server.
Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2013-5807, CVE-2013-5891, CVE-2014-0386, CVE-2014-0393, CVE-2014-0401, CVE-2014-0402, CVE-2014-0412, CVE-2014-0420, CVE-2014-0437, CVE-2013-3839, CVE-2013-5908)

A buffer overflow flaw was found in the way the MySQL command line client tool (mysql) processed excessively long version strings. If a user connected to a malicious MySQL server via the mysql client, the server could use this flaw to crash the mysql client or, potentially, execute arbitrary code as the user running the mysql client. (CVE-2014-0001)

The CVE-2014-0001 issue was discovered by Garth Mollett of the Red Hat Security Response Team.

These updated packages upgrade MySQL to version 5.5.36. Refer to the MySQL Release Notes listed in the References section for a complete list of changes.

All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL mysql55-mysql package based on the guidance in RHSA-2014:0186.

See Also

http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-36.html

http://www.nessus.org/u?532e14d2

http://www.nessus.org/u?d3ee6fa1

http://www.nessus.org/u?e038a357

https://access.redhat.com/errata/RHSA-2014:0186

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=1019978

https://bugzilla.redhat.com/show_bug.cgi?id=1019997

https://bugzilla.redhat.com/show_bug.cgi?id=1053371

https://bugzilla.redhat.com/show_bug.cgi?id=1053373

https://bugzilla.redhat.com/show_bug.cgi?id=1053375

https://bugzilla.redhat.com/show_bug.cgi?id=1053377

https://bugzilla.redhat.com/show_bug.cgi?id=1053378

https://bugzilla.redhat.com/show_bug.cgi?id=1053380

https://bugzilla.redhat.com/show_bug.cgi?id=1053381

https://bugzilla.redhat.com/show_bug.cgi?id=1053383

https://bugzilla.redhat.com/show_bug.cgi?id=1053390

https://bugzilla.redhat.com/show_bug.cgi?id=1054592

Plugin Details

Severity: Medium

ID: 72568

File Name: redhat-RHSA-2014-0186.nasl

Version: 1.16

Type: local

Agent: unix

Published: 2/19/2014

Updated: 11/4/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2014-0001

CVSS v3

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2014-0437

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:mysql55-mysql, p-cpe:/a:redhat:enterprise_linux:mysql55-mysql-bench, p-cpe:/a:redhat:enterprise_linux:mysql55-mysql-devel, p-cpe:/a:redhat:enterprise_linux:mysql55-mysql-test, p-cpe:/a:redhat:enterprise_linux:mysql55-mysql-server, p-cpe:/a:redhat:enterprise_linux:mysql55-mysql-libs

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 2/18/2014

Reference Information

CVE: CVE-2013-3839, CVE-2013-5807, CVE-2013-5891, CVE-2013-5908, CVE-2014-0001, CVE-2014-0386, CVE-2014-0393, CVE-2014-0401, CVE-2014-0402, CVE-2014-0412, CVE-2014-0420, CVE-2014-0437

BID: 63105, 63109, 64849, 64877, 64880, 64888, 64891, 64896, 64898, 64904, 64908, 65298

RHSA: 2014:0186