[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:150 -- Mandriva mysql

ID: oval:org.secpod.oval:def:301436Date: (C)2012-01-07   (M)2021-06-02
Class: PATCHFamily: unix




Multiple buffer overflows in yaSSL, which is used in MySQL, allowed remote attackers to execute arbitrary code or cause a denial of service via a special Hello packet . Sergei Golubchik found that MySQL did not properly validate optional data or index directory paths given in a CREATE TABLE statement; as well it would not, under certain conditions, prevent two databases from using the same paths for data or index files. This could allow an authenticated user with appropriate privilege to create tables in one database to read and manipulate data in tables later created in other databases, regardless of GRANT privileges . The updated packages have been patched to correct these issues.

Platform:
Mandriva Linux 2007.1
Mandriva Linux 2008.0
Product:
mysql
Reference:
MDVSA-2008:150
CVE-2008-0226
CVE-2008-0227
CVE-2008-2079
CVE    3
CVE-2008-0226
CVE-2008-0227
CVE-2008-2079
CPE    2
cpe:/o:mandriva:linux:2007.1
cpe:/o:mandriva:linux:2008.0

© SecPod Technologies