[31603] in bugtraq
GLSA: mysql (200309-08)
daemon@ATHENA.MIT.EDU (Daniel Ahlberg)
Mon Sep 15 20:55:00 2003
To: gentoo-announce@gentoo.org, bugtraq@securityfocus.com,
full-disclosure@lists.netsys.com
Message-Id: <20030915100100.B684C9FBC5@noc.internal.fairytale.se>
Date: Mon, 15 Sep 2003 12:01:00 +0200 (CEST)
From: aliz@gentoo.org (Daniel Ahlberg)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-08
- - - ---------------------------------------------------------------------
PACKAGE : mysql
SUMMARY : buffer overflow
DATE : 2003-09-15 10:00 UTC
EXPLOIT : remote
VERSIONS AFFECTED : <mysql-3.23.57-r1 <mysql-4.0.13-r4 >=mysql-4.0.14-r2(masked)
FIXED VERSION : >=mysql-3.23.57-r1 >=mysql-4.0.13-r4 >=mysql-4.0.14-r2(masked)
CVE : CAN-2003-0780
- - - ---------------------------------------------------------------------
quote from advisory:
"Anyone with global administrative privileges on a MySQL server may
execute arbitrary code even on a host he isn't supposed to have a shell
on, with the privileges of the system account running the MySQL server."
read the full advisory at:
http://www.securityfocus.com/archive/1/337012
SOLUTION
It is recommended that all Gentoo Linux users who are running
dev-db/mysql upgrade to either one of these versions:
3.23.x - mysql-3.23.57-r1
4.0.x - mysql-4.0.13-r4 OR
mysql-4.0.14-r2 if accepting "~" keywords.
emerge sync
emerge \=dev-db/mysql/<mysql version>
emerge clean
- - - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at http://dev.gentoo.org/~aliz
solar@gentoo.org
- - - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
iD8DBQE/ZY3cfT7nyhUpoZMRAjpJAJ0ZTUg/pJxdsWeIpxTJX/cDMatkEQCeKmFU
GGrAKtwqtPNuiguwyhelHys=
=uFLV
-----END PGP SIGNATURE-----