Lucene search

K
nessusThis script is Copyright (C) 2005-2021 Tenable Network Security, Inc.GENTOO_GLSA-200503-19.NASL
HistoryMar 17, 2005 - 12:00 a.m.

GLSA-200503-19 : MySQL: Multiple vulnerabilities

2005-03-1700:00:00
This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.
www.tenable.com
22

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.969

Percentile

99.7%

The remote host is affected by the vulnerability described in GLSA-200503-19 (MySQL: Multiple vulnerabilities)

MySQL fails to properly validate input for authenticated users with     INSERT and DELETE privileges (CAN-2005-0709 and CAN-2005-0710).
Furthermore MySQL uses predictable filenames when creating temporary     files with CREATE TEMPORARY TABLE (CAN-2005-0711).

Impact :

An attacker with INSERT and DELETE privileges could exploit this to     manipulate the mysql table or accessing libc calls, potentially leading     to the execution of arbitrary code with the permissions of the user     running MySQL. An attacker with CREATE TEMPORARY TABLE privileges could     exploit this to overwrite arbitrary files via a symlink attack.

Workaround :

There is no known workaround at this time.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200503-19.
#
# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(17344);
  script_version("1.16");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");

  script_cve_id("CVE-2005-0709", "CVE-2005-0710", "CVE-2005-0711");
  script_xref(name:"GLSA", value:"200503-19");

  script_name(english:"GLSA-200503-19 : MySQL: Multiple vulnerabilities");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200503-19
(MySQL: Multiple vulnerabilities)

    MySQL fails to properly validate input for authenticated users with
    INSERT and DELETE privileges (CAN-2005-0709 and CAN-2005-0710).
    Furthermore MySQL uses predictable filenames when creating temporary
    files with CREATE TEMPORARY TABLE (CAN-2005-0711).
  
Impact :

    An attacker with INSERT and DELETE privileges could exploit this to
    manipulate the mysql table or accessing libc calls, potentially leading
    to the execution of arbitrary code with the permissions of the user
    running MySQL. An attacker with CREATE TEMPORARY TABLE privileges could
    exploit this to overwrite arbitrary files via a symlink attack.
  
Workaround :

    There is no known workaround at this time."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200503-19"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All MySQL users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose '>=dev-db/mysql-4.0.24'"
  );
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:mysql");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2005/03/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2005/03/17");
  script_set_attribute(attribute:"vuln_publication_date", value:"2005/03/11");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"dev-db/mysql", unaffected:make_list("ge 4.0.24"), vulnerable:make_list("lt 4.0.24"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "MySQL");
}
VendorProductVersionCPE
gentoolinuxmysqlp-cpe:/a:gentoo:linux:mysql
gentoolinuxcpe:/o:gentoo:linux

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.969

Percentile

99.7%