Lucene search

K
osvGoogleOSV:DSA-1997-1
HistoryFeb 14, 2010 - 12:00 a.m.

mysql-dfsg-5.0 - several vulnerabilities

2010-02-1400:00:00
Google
osv.dev
17

EPSS

0.972

Percentile

99.8%

Several vulnerabilities have been discovered in the MySQL
database server.
The Common Vulnerabilities and Exposures project identifies the
following problems:

  • CVE-2009-4019
    Domas Mituzas discovered that mysqld does not properly handle errors during
    execution of certain SELECT statements with subqueries, and does not preserve
    certain null_value flags during execution of statements that use the
    GeomFromWKB function, which allows remote authenticated users to cause a
    denial of service (daemon crash) via a crafted statement.
  • CVE-2009-4030
    Sergei Golubchik discovered that MySQL allows local users to bypass certain
    privilege checks by calling CREATE TABLE on a MyISAM table with modified
    DATA DIRECTORY or INDEX DIRECTORY arguments that are originally associated
    with pathnames without symlinks, and that can point to tables created at
    a future time at which a pathname is modified to contain a symlink to a
    subdirectory of the MySQL data home directory.
  • CVE-2009-4484
    Multiple stack-based buffer overflows in the CertDecoder::GetName function
    in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld, allow
    remote attackers to execute arbitrary code or cause a denial of service
    (memory corruption and daemon crash) by establishing an SSL connection and
    sending an X.509 client certificate with a crafted name field.

For the oldstable distribution (etch), these problems have been fixed in
version 5.0.32-7etch12

For the stable distribution (lenny), these problems have been fixed in
version 5.0.51a-24+lenny3

The testing (squeeze) and unstable (sid) distribution do not contain
mysql-dfsg-5 anymore.

We recommend that you upgrade your mysql-dfsg-5.0 packages.