Lucene search

K
cveRedhatCVE-2008-4098
HistorySep 18, 2008 - 3:04 p.m.

CVE-2008-4098

2008-09-1815:04:27
CWE-59
redhat
web.nvd.nist.gov
169
mysql
cve-2008-4098
privilege checks
vulnerability
nvd

CVSS2

4.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:S/C:P/I:P/A:P

AI Score

6.3

Confidence

Low

EPSS

0.001

Percentile

35.0%

MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.

Affected configurations

Nvd
Node
canonicalubuntu_linuxMatch6.06lts
OR
canonicalubuntu_linuxMatch7.10
OR
canonicalubuntu_linuxMatch8.04lts
OR
canonicalubuntu_linuxMatch8.10
OR
canonicalubuntu_linuxMatch9.04
OR
canonicalubuntu_linuxMatch9.10
Node
debiandebian_linuxMatch5.0
Node
mysqlmysqlMatch5.0.0
OR
mysqlmysqlMatch5.0.1
OR
mysqlmysqlMatch5.0.2
OR
mysqlmysqlMatch5.0.3
OR
mysqlmysqlMatch5.0.4
OR
mysqlmysqlMatch5.0.5
OR
mysqlmysqlMatch5.0.10
OR
mysqlmysqlMatch5.0.15
OR
mysqlmysqlMatch5.0.16
OR
mysqlmysqlMatch5.0.17
OR
mysqlmysqlMatch5.0.20
OR
mysqlmysqlMatch5.0.24
OR
mysqlmysqlMatch5.0.30
OR
mysqlmysqlMatch5.0.36
OR
mysqlmysqlMatch5.0.44
OR
mysqlmysqlMatch5.0.54
OR
mysqlmysqlMatch5.0.56
OR
mysqlmysqlMatch5.0.60
OR
mysqlmysqlMatch5.0.66
OR
oraclemysqlMatch5.0.23
OR
oraclemysqlMatch5.0.25
OR
oraclemysqlMatch5.0.26
OR
oraclemysqlMatch5.0.28
OR
oraclemysqlMatch5.0.30sp1
OR
oraclemysqlMatch5.0.32
OR
oraclemysqlMatch5.0.34
OR
oraclemysqlMatch5.0.36sp1
OR
oraclemysqlMatch5.0.38
OR
oraclemysqlMatch5.0.40
OR
oraclemysqlMatch5.0.41
OR
oraclemysqlMatch5.0.42
OR
oraclemysqlMatch5.0.44sp1
OR
oraclemysqlMatch5.0.45
OR
oraclemysqlMatch5.0.46
OR
oraclemysqlMatch5.0.48
OR
oraclemysqlMatch5.0.50
OR
oraclemysqlMatch5.0.50sp1
OR
oraclemysqlMatch5.0.51
OR
oraclemysqlMatch5.0.52
OR
oraclemysqlMatch5.0.56sp1
OR
oraclemysqlMatch5.0.58
OR
oraclemysqlMatch5.0.60sp1
OR
oraclemysqlMatch5.0.62
OR
oraclemysqlMatch5.0.64
OR
oraclemysqlMatch5.0.66sp1
VendorProductVersionCPE
canonicalubuntu_linux6.06cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
canonicalubuntu_linux7.10cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
canonicalubuntu_linux8.04cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
canonicalubuntu_linux8.10cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
canonicalubuntu_linux9.04cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
canonicalubuntu_linux9.10cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
debiandebian_linux5.0cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
mysqlmysql5.0.0cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*
mysqlmysql5.0.1cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
mysqlmysql5.0.2cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
Rows per page:
1-10 of 521

CVSS2

4.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:S/C:P/I:P/A:P

AI Score

6.3

Confidence

Low

EPSS

0.001

Percentile

35.0%