LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandrake: MySQL multiple vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
Mandrake Two vulnerabilities were discovered in all versions of MySQL prior to 3.23.53a and 4.0.5a by Stefan Esser.

________________________________________________________________________

                Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name:           MySQL
Advisory ID:            MDKSA-2002:087
Date:                   December 18th, 2002

Affected versions:      7.2, 8.0, 8.1, 8.2, 9.0,
                        Single Network Firewall 7.2
________________________________________________________________________

Problem Description:

 Two vulnerabilities were discovered in all versions of MySQL prior
 to 3.23.53a and 4.0.5a by Stefan Esser.  The first can be used by
 any valid MySQL user to crash the MySQL server, the other allows
 anyone to bypass the MySQL password check or execute arbitraty code
 with the privilege of the user running mysqld.  Another two
 vulnerabilities were found, one an arbitrary size heap overflow in
 the mysql client library and another that allows one to write '\0'
 to any memory address.  Both of these flaws could allow DOS attacks
 or arbitary code execution within anything linked against
 libmysqlclient.
________________________________________________________________________

References:

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1373
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1374
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1375
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1376
   http://security.e-matters.de/advisories/042002.html
________________________________________________________________________

Updated Packages:

 Linux-Mandrake 7.2:
 b166306457893f8b3282184f240fd9b1  7.2/RPMS/MySQL-3.23.31-1.3mdk.i586.rpm
 35d8f0b4687252374a097599887f1725  7.2/RPMS/MySQL-bench-3.23.31-1.3mdk.i586.rpm
 4d93a18b4fcdfca0c8a01a7f7e9570e9  7.2/RPMS/MySQL-client-3.23.31-1.3mdk.i586.rpm
 a018d2ad3b0de7d753623cdcce27b22e  7.2/RPMS/MySQL-devel-3.23.31-1.3mdk.i586.rpm
 ba37b9ff30f6764ed983aef424e90dc2  7.2/RPMS/MySQL-shared-3.23.31-1.3mdk.i586.rpm
 c00aada3c758eefe58151076a1b299fd  7.2/SRPMS/MySQL-3.23.31-1.3mdk.src.rpm

 Mandrake Linux 8.0:
 4b6af13a4793e88cc62d3f387a6866ff  8.0/RPMS/MySQL-3.23.36-2.2mdk.i586.rpm
 7aa483f26f4165bb9d0d25cb0026264f  8.0/RPMS/MySQL-bench-3.23.36-2.2mdk.i586.rpm
 d9b8b677f4223f410dee6ae81196ce7b  8.0/RPMS/MySQL-client-3.23.36-2.2mdk.i586.rpm
 0d312e6f2a6976bdc5c983c35ee7d8c7  8.0/RPMS/MySQL-devel-3.23.36-2.2mdk.i586.rpm
 8144ea3c5d2a932cabf3291442ac1461  8.0/RPMS/MySQL-shared-3.23.36-2.2mdk.i586.rpm
 1b62d0cc238dd5a0f275fef3e85dd546  8.0/SRPMS/MySQL-3.23.36-2.2mdk.src.rpm

 Mandrake Linux 8.0/PPC:
 7c4f518418edcb5a93496362bdfd36d9  ppc/8.0/RPMS/MySQL-3.23.36-2.2mdk.ppc.rpm
 f05c417ed6d19b49d130856b82382fc0  ppc/8.0/RPMS/MySQL-bench-3.23.36-2.2mdk.ppc.rpm
 ad0bc3f2ea34762eae55cfe88bd362d2  ppc/8.0/RPMS/MySQL-client-3.23.36-2.2mdk.ppc.rpm
 9dd8d7f8e91ddc2d23d37e5569590760  ppc/8.0/RPMS/MySQL-devel-3.23.36-2.2mdk.ppc.rpm
 4ca237bf5daffef6be66d405e88804f7  ppc/8.0/RPMS/MySQL-shared-3.23.36-2.2mdk.ppc.rpm
 1b62d0cc238dd5a0f275fef3e85dd546  ppc/8.0/SRPMS/MySQL-3.23.36-2.2mdk.src.rpm

 Mandrake Linux 8.1:
 5e030a0a33e769236db4787e68fb680c  8.1/RPMS/MySQL-3.23.41-5.2mdk.i586.rpm
 ec5e479b967ca4ca32bae867615c0937  8.1/RPMS/MySQL-bench-3.23.41-5.2mdk.i586.rpm
 3c9264c8423879310b420bb36b94fba4  8.1/RPMS/MySQL-client-3.23.41-5.2mdk.i586.rpm
 ee5963f86718492b9e1f9b0f7a94c67a  8.1/RPMS/MySQL-devel-3.23.41-5.2mdk.i586.rpm
 cfda05c4fab2319610b308630bc5070b  8.1/RPMS/MySQL-shared-3.23.41-5.2mdk.i586.rpm
 3015c5751c42f57ca995aa9e35dc98d9  8.1/SRPMS/MySQL-3.23.41-5.2mdk.src.rpm

 Mandrake Linux 8.1/IA64:
 d889840fdfc3a0e2d60a5c6a3abbc80f  ia64/8.1/RPMS/MySQL-3.23.41-5.2mdk.ia64.rpm
 4eb02343af8c4164f4843483632f809c  ia64/8.1/RPMS/MySQL-bench-3.23.41-5.2mdk.ia64.rpm
 4ce23f1832c8e9cc639825c912ecc00c  ia64/8.1/RPMS/MySQL-client-3.23.41-5.2mdk.ia64.rpm
 54488a9376456c194ae52972b4cbef40  ia64/8.1/RPMS/MySQL-devel-3.23.41-5.2mdk.ia64.rpm
 87cb539fb4b766bc953eda11a4c108ff  ia64/8.1/RPMS/MySQL-shared-3.23.41-5.2mdk.ia64.rpm
 3015c5751c42f57ca995aa9e35dc98d9  ia64/8.1/SRPMS/MySQL-3.23.41-5.2mdk.src.rpm

 Mandrake Linux 8.2:
 7d64ea88a1169e24156aaadb90f180b7  8.2/RPMS/MySQL-3.23.47-5.2mdk.i586.rpm
 24cd7a54bf156c60bc8d3ad79901294c  8.2/RPMS/MySQL-bench-3.23.47-5.2mdk.i586.rpm
 675a36d4bda9805f7a170a0b40534e0a  8.2/RPMS/MySQL-client-3.23.47-5.2mdk.i586.rpm
 ce4ca8d131fbcbffad25d814ffbb5037  8.2/RPMS/libmysql10-3.23.47-5.2mdk.i586.rpm
 c206cd198bb49e3f7eae06ea7aa3edb6  8.2/RPMS/libmysql10-devel-3.23.47-5.2mdk.i586.rpm
 61b30c1b962257076b97551ec3b9108e  8.2/SRPMS/MySQL-3.23.47-5.2mdk.src.rpm

 Mandrake Linux 8.2/PPC:
 d5e56b63ffb6b4716e2797ad3e910cea  ppc/8.2/RPMS/MySQL-3.23.47-5.2mdk.ppc.rpm
 c3a5a625fa4c57a96c471ba7983ae968  ppc/8.2/RPMS/MySQL-bench-3.23.47-5.2mdk.ppc.rpm
 935a541a28b63b37260b66edba1172d5  ppc/8.2/RPMS/MySQL-client-3.23.47-5.2mdk.ppc.rpm
 96a99016a2dcf43b90a32be80099eb17  ppc/8.2/RPMS/libmysql10-3.23.47-5.2mdk.ppc.rpm
 0b7ac7e6cace4d5c6f82dadf585cbab1  ppc/8.2/RPMS/libmysql10-devel-3.23.47-5.2mdk.ppc.rpm
 61b30c1b962257076b97551ec3b9108e  ppc/8.2/SRPMS/MySQL-3.23.47-5.2mdk.src.rpm

 Mandrake Linux 9.0:
 c91dcf7308b93a72c0077572a45b72bd  9.0/RPMS/MySQL-3.23.52-1.2mdk.i586.rpm
 602dd52dac9dfd30363ba5758cbf0d77  9.0/RPMS/MySQL-Max-3.23.52-1.2mdk.i586.rpm
 5f54a03a9945f66124bc425962320ae8  9.0/RPMS/MySQL-bench-3.23.52-1.2mdk.i586.rpm
 580aa65c581057bac618b4a573b5e11e  9.0/RPMS/MySQL-client-3.23.52-1.2mdk.i586.rpm
 e277399bcbc5dde8fac8751ea0dd3f55  9.0/RPMS/libmysql10-3.23.52-1.2mdk.i586.rpm
 592653f0ecbd62c4ff05b97edcf8406c  9.0/RPMS/libmysql10-devel-3.23.52-1.2mdk.i586.rpm
 c16d3a2e7738ecec13b373be342e8906  9.0/SRPMS/MySQL-3.23.52-1.2mdk.src.rpm

 Single Network Firewall 7.2:
 4d93a18b4fcdfca0c8a01a7f7e9570e9  snf7.2/RPMS/MySQL-client-3.23.31-1.3mdk.i586.rpm
 ba37b9ff30f6764ed983aef424e90dc2  snf7.2/RPMS/MySQL-shared-3.23.31-1.3mdk.i586.rpm
 c00aada3c758eefe58151076a1b299fd  snf7.2/SRPMS/MySQL-3.23.31-1.3mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
________________________________________________________________________

To upgrade automatically, use MandrakeUpdate.  The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".  A list of
FTP mirrors can be obtained from:

   http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:

  rpm --checksig 

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team from:

  https://www.mandrakesecure.net/RPM-GPG-KEYS
Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other update advisories for Mandrake Linux at:

   http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by
visiting:

   http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  


 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.