Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2004-0837
Vulnerability from cvelistv5
Published
2004-10-16 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.457Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.mysql.com/internals/16174" }, { "name": "RHSA-2004:611", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "name": "12783", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12783/" }, { "name": "DSA-562", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "name": "20041125 [USN-32-1] mysql vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.mysql.com/internals/16173" }, { "name": "mysql-union-dos(17667)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" }, { "name": "101864", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "11357", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11357" }, { "name": "CLA-2004:892", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "name": "RHSA-2004:597", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.mysql.com/internals/16168" }, { "name": "GLSA-200410-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "name": "2004-0054", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/2408" }, { "name": "1011606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1011606" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-10-11T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://lists.mysql.com/internals/16174" }, { "name": "RHSA-2004:611", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "name": "12783", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12783/" }, { "name": "DSA-562", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "name": "20041125 [USN-32-1] mysql vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.mysql.com/internals/16173" }, { "name": "mysql-union-dos(17667)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" }, { "name": "101864", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "11357", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11357" }, { "name": "CLA-2004:892", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "name": "RHSA-2004:597", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.mysql.com/internals/16168" }, { "name": "GLSA-200410-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "name": "2004-0054", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/2408" }, { "name": "1011606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1011606" }, { "tags": [ "x_refsource_MISC" ], "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0837", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.mysql.com/internals/16174", "refsource": "MISC", "url": "http://lists.mysql.com/internals/16174" }, { "name": "RHSA-2004:611", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "name": "12783", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12783/" }, { "name": "DSA-562", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-562" }, { "name": "20041125 [USN-32-1] mysql vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "name": "http://lists.mysql.com/internals/16173", "refsource": "MISC", "url": "http://lists.mysql.com/internals/16173" }, { "name": "mysql-union-dos(17667)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" }, { "name": "101864", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "11357", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11357" }, { "name": "CLA-2004:892", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "name": "RHSA-2004:597", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "name": "http://lists.mysql.com/internals/16168", "refsource": "MISC", "url": "http://lists.mysql.com/internals/16168" }, { "name": "GLSA-200410-22", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "name": "2004-0054", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0054/" }, { "name": "http://bugs.mysql.com/2408", "refsource": "MISC", "url": "http://bugs.mysql.com/2408" }, { "name": "1011606", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1011606" }, { "name": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15", "refsource": "MISC", "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0837", "datePublished": "2004-10-16T04:00:00", "dateReserved": "2004-09-08T00:00:00", "dateUpdated": "2024-08-08T00:31:47.457Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2004-0837\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2004-11-03T05:00:00.000\",\"lastModified\":\"2024-11-20T23:49:31.980\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.\"},{\"lang\":\"es\",\"value\":\"MySQL 4 anteriores a 4.0.21 y 3.x anteriores a 3.23.49 permiten a atacantes causar una denegaci\u00f3n de servicio (ca\u00edda o cuelgue) mediante m\u00faltiples hilos de ejecuci\u00f3n que alter\u00e1n simultaneamente UNIONes de tablas MERGE.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:N/A:P\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFEDB808-A8D8-403E-9103-AB486C793EF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.20\",\"versionEndExcluding\":\"3.23.49\",\"matchCriteriaId\":\"B4E0733B-5C1C-4579-9FD2-251E45E8D93F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.0.21\",\"matchCriteriaId\":\"E9CB33C2-B487-4DC3-A7F4-4A9D61EA12FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CAE037F-111C-4A76-8FFE-716B74D65EF3\"}]}]}],\"references\":[{\"url\":\"http://bugs.mysql.com/2408\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.mysql.com/internals/16168\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.mysql.com/internals/16173\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.mysql.com/internals/16174\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/12783/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1011606\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ciac.org/ciac/bulletins/p-018.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2004/dsa-562\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-597.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-611.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/11357\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.trustix.org/errata/2004/0054/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/17667\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://bugs.mysql.com/2408\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.mysql.com/internals/16168\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.mysql.com/internals/16173\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.mysql.com/internals/16174\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/12783/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1011606\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ciac.org/ciac/bulletins/p-018.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2004/dsa-562\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-597.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-611.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/11357\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.trustix.org/errata/2004/0054/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/17667\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
RHSA-2004:611
Vulnerability from csaf_redhat
Published
2004-10-27 15:18
Modified
2024-11-14 10:03
Summary
Red Hat Security Advisory: mysql-server security update
Notes
Topic
An updated mysql-server package that fixes various security issues is now
available in the Red Hat Enterprise Linux 3 Extras channel of Red Hat Network.
Details
MySQL is a multi-user, multi-threaded SQL database server.
A number of security issues that affect the mysql-server package have been
reported. Although Red Hat Enterprise Linux 3 does not ship with the
mysql-server package, the affected package is available from the Red Hat
Network Extras channel.
Oleksandr Byelkin discovered that "ALTER TABLE ... RENAME" checked
the CREATE/INSERT rights of the old table instead of the new one. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0835 to this issue.
Lukasz Wojtow discovered a buffer overrun in the mysql_real_connect
function. In order to exploit this issue an attacker would need to force
the use of a malicious DNS server (CAN-2004-0836).
Dean Ellis discovered that multiple threads ALTERing the same (or
different) MERGE tables to change the UNION could cause the server to crash
or stall (CAN-2004-0837).
Sergei Golubchik discovered that if a user is granted privileges to a
database with a name containing an underscore ("_"), the user also gains
the ability to grant privileges to other databases with similar names
(CAN-2004-0957).
Users of mysql-server should upgrade to these erratum packages, which
correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated mysql-server package that fixes various security issues is now\navailable in the Red Hat Enterprise Linux 3 Extras channel of Red Hat Network.", "title": "Topic" }, { "category": "general", "text": "MySQL is a multi-user, multi-threaded SQL database server.\n\nA number of security issues that affect the mysql-server package have been\nreported. Although Red Hat Enterprise Linux 3 does not ship with the\nmysql-server package, the affected package is available from the Red Hat\nNetwork Extras channel. \n\nOleksandr Byelkin discovered that \"ALTER TABLE ... RENAME\" checked\nthe CREATE/INSERT rights of the old table instead of the new one. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2004-0835 to this issue.\n\nLukasz Wojtow discovered a buffer overrun in the mysql_real_connect\nfunction. In order to exploit this issue an attacker would need to force\nthe use of a malicious DNS server (CAN-2004-0836).\n\nDean Ellis discovered that multiple threads ALTERing the same (or\ndifferent) MERGE tables to change the UNION could cause the server to crash\nor stall (CAN-2004-0837).\n\nSergei Golubchik discovered that if a user is granted privileges to a\ndatabase with a name containing an underscore (\"_\"), the user also gains\nthe ability to grant privileges to other databases with similar names\n(CAN-2004-0957).\n\nUsers of mysql-server should upgrade to these erratum packages, which\ncorrect these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:611", "url": "https://access.redhat.com/errata/RHSA-2004:611" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "135372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=135372" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_611.json" } ], "title": "Red Hat Security Advisory: mysql-server security update", "tracking": { "current_release_date": "2024-11-14T10:03:21+00:00", "generator": { "date": "2024-11-14T10:03:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2004:611", "initial_release_date": "2004-10-27T15:18:00+00:00", "revision_history": [ { "date": "2004-10-27T15:18:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-10-27T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:03:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Desktop version 3 Extras", "product": { "name": "Red Hat Desktop version 3 Extras", "product_id": "Red Hat Desktop version 3 Extras", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0835", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617308" } ], "notes": [ { "category": "description", "text": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Desktop version 3 Extras" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0835" }, { "category": "external", "summary": "RHBZ#1617308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617308" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0835", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835" } ], "release_date": "2004-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-27T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.m", "product_ids": [ "Red Hat Desktop version 3 Extras" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0836", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617309" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Desktop version 3 Extras" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0836" }, { "category": "external", "summary": "RHBZ#1617309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617309" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0836", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836" } ], "release_date": "2004-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-27T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.m", "product_ids": [ "Red Hat Desktop version 3 Extras" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:611" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0837", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617310" } ], "notes": [ { "category": "description", "text": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Desktop version 3 Extras" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0837" }, { "category": "external", "summary": "RHBZ#1617310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0837", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837" } ], "release_date": "2004-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-27T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.m", "product_ids": [ "Red Hat Desktop version 3 Extras" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0957", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617330" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Desktop version 3 Extras" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0957" }, { "category": "external", "summary": "RHBZ#1617330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0957", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0957" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957" } ], "release_date": "2004-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-27T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.m", "product_ids": [ "Red Hat Desktop version 3 Extras" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:611" } ], "title": "security flaw" } ] }
RHSA-2004:597
Vulnerability from csaf_redhat
Published
2004-10-20 19:16
Modified
2024-11-21 23:15
Summary
Red Hat Security Advisory: mysql security update
Notes
Topic
Updated mysql packages that fix various security issues, as well as a
number of bugs, are now available for Red Hat Enterprise Linux 2.1.
Details
MySQL is a multi-user, multi-threaded SQL database server.
A number security issues that affect the mysql server have been reported:
Oleksandr Byelkin discovered that "ALTER TABLE ... RENAME" checked
the CREATE/INSERT rights of the old table instead of the new one. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0835 to this issue.
Lukasz Wojtow discovered a buffer overrun in the mysql_real_connect
function. In order to exploit this issue an attacker would need to force
the use of a malicious DNS server (CAN-2004-0836).
Dean Ellis discovered that multiple threads ALTERing the same (or
different) MERGE tables to change the UNION could cause the server to crash
or stall (CAN-2004-0837).
Sergei Golubchik discovered that if a user is granted privileges to a
database with a name containing an underscore ("_"), the user also gains
the ability to grant privileges to other databases with similar names
(CAN-2004-0957).
Additionally, the following minor temporary file vulnerabilities were
discovered:
- Stan Bubroski and Shaun Colley found a temporary file vulnerability in
the mysqlbug script (CAN-2004-0381).
- A temporary file vulnerability was discovered in mysqld_multi
(CAN-2004-0388).
- Jeroen van Wolffelaar discovered an temporary file vulnerability in the
mysqlhotcopy script when using the scp method (CAN-2004-0457).
All users of mysql should upgrade to these updated packages, which resolve
these issues and also include fixes for a number of small bugs.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated mysql packages that fix various security issues, as well as a\nnumber of bugs, are now available for Red Hat Enterprise Linux 2.1.", "title": "Topic" }, { "category": "general", "text": "MySQL is a multi-user, multi-threaded SQL database server.\n\nA number security issues that affect the mysql server have been reported: \n\nOleksandr Byelkin discovered that \"ALTER TABLE ... RENAME\" checked\nthe CREATE/INSERT rights of the old table instead of the new one. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2004-0835 to this issue.\n\nLukasz Wojtow discovered a buffer overrun in the mysql_real_connect\nfunction. In order to exploit this issue an attacker would need to force\nthe use of a malicious DNS server (CAN-2004-0836).\n\nDean Ellis discovered that multiple threads ALTERing the same (or\ndifferent) MERGE tables to change the UNION could cause the server to crash\nor stall (CAN-2004-0837).\n\nSergei Golubchik discovered that if a user is granted privileges to a\ndatabase with a name containing an underscore (\"_\"), the user also gains\nthe ability to grant privileges to other databases with similar names\n(CAN-2004-0957).\n\nAdditionally, the following minor temporary file vulnerabilities were\ndiscovered:\n \n- Stan Bubroski and Shaun Colley found a temporary file vulnerability in \n the mysqlbug script (CAN-2004-0381).\n- A temporary file vulnerability was discovered in mysqld_multi \n (CAN-2004-0388).\n- Jeroen van Wolffelaar discovered an temporary file vulnerability in the \n mysqlhotcopy script when using the scp method (CAN-2004-0457).\n\nAll users of mysql should upgrade to these updated packages, which resolve\nthese issues and also include fixes for a number of small bugs.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:597", "url": "https://access.redhat.com/errata/RHSA-2004:597" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "112693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=112693" }, { "category": "external", "summary": "113960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=113960" }, { "category": "external", "summary": "115165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=115165" }, { "category": "external", "summary": "124352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=124352" }, { "category": "external", "summary": "129409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=129409" }, { "category": "external", "summary": "130348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130348" }, { "category": "external", "summary": "135372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=135372" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_597.json" } ], "title": "Red Hat Security Advisory: mysql security update", "tracking": { "current_release_date": "2024-11-21T23:15:37+00:00", "generator": { "date": "2024-11-21T23:15:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2004:597", "initial_release_date": "2004-10-20T19:16:00+00:00", "revision_history": [ { "date": "2004-10-20T19:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-10-20T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:15:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0381", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617187" } ], "notes": [ { "category": "description", "text": "mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0381" }, { "category": "external", "summary": "RHBZ#1617187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0381", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0381" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0381", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0381" } ], "release_date": "2004-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0388", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617190" } ], "notes": [ { "category": "description", "text": "The mysqld_multi script in MySQL allows local users to overwrite arbitrary files via a symlink attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0388" }, { "category": "external", "summary": "RHBZ#1617190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0388", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0388" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0388", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0388" } ], "release_date": "2004-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0457", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617209" } ], "notes": [ { "category": "description", "text": "The mysqlhotcopy script in mysql 4.0.20 and earlier, when using the scp method from the mysql-server package, allows local users to overwrite arbitrary files via a symlink attack on temporary files.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0457" }, { "category": "external", "summary": "RHBZ#1617209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617209" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0457", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0457" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0457", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0457" } ], "release_date": "2004-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "title": "security flaw" }, { "cve": "CVE-2004-0835", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617308" } ], "notes": [ { "category": "description", "text": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0835" }, { "category": "external", "summary": "RHBZ#1617308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617308" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0835", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835" } ], "release_date": "2004-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0836", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617309" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0836" }, { "category": "external", "summary": "RHBZ#1617309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617309" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0836", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836" } ], "release_date": "2004-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0837", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617310" } ], "notes": [ { "category": "description", "text": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0837" }, { "category": "external", "summary": "RHBZ#1617310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0837", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837" } ], "release_date": "2004-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0957", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617330" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0957" }, { "category": "external", "summary": "RHBZ#1617330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0957", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0957" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957" } ], "release_date": "2004-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "title": "security flaw" } ] }
rhsa-2004_611
Vulnerability from csaf_redhat
Published
2004-10-27 15:18
Modified
2024-11-14 10:03
Summary
Red Hat Security Advisory: mysql-server security update
Notes
Topic
An updated mysql-server package that fixes various security issues is now
available in the Red Hat Enterprise Linux 3 Extras channel of Red Hat Network.
Details
MySQL is a multi-user, multi-threaded SQL database server.
A number of security issues that affect the mysql-server package have been
reported. Although Red Hat Enterprise Linux 3 does not ship with the
mysql-server package, the affected package is available from the Red Hat
Network Extras channel.
Oleksandr Byelkin discovered that "ALTER TABLE ... RENAME" checked
the CREATE/INSERT rights of the old table instead of the new one. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0835 to this issue.
Lukasz Wojtow discovered a buffer overrun in the mysql_real_connect
function. In order to exploit this issue an attacker would need to force
the use of a malicious DNS server (CAN-2004-0836).
Dean Ellis discovered that multiple threads ALTERing the same (or
different) MERGE tables to change the UNION could cause the server to crash
or stall (CAN-2004-0837).
Sergei Golubchik discovered that if a user is granted privileges to a
database with a name containing an underscore ("_"), the user also gains
the ability to grant privileges to other databases with similar names
(CAN-2004-0957).
Users of mysql-server should upgrade to these erratum packages, which
correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated mysql-server package that fixes various security issues is now\navailable in the Red Hat Enterprise Linux 3 Extras channel of Red Hat Network.", "title": "Topic" }, { "category": "general", "text": "MySQL is a multi-user, multi-threaded SQL database server.\n\nA number of security issues that affect the mysql-server package have been\nreported. Although Red Hat Enterprise Linux 3 does not ship with the\nmysql-server package, the affected package is available from the Red Hat\nNetwork Extras channel. \n\nOleksandr Byelkin discovered that \"ALTER TABLE ... RENAME\" checked\nthe CREATE/INSERT rights of the old table instead of the new one. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2004-0835 to this issue.\n\nLukasz Wojtow discovered a buffer overrun in the mysql_real_connect\nfunction. In order to exploit this issue an attacker would need to force\nthe use of a malicious DNS server (CAN-2004-0836).\n\nDean Ellis discovered that multiple threads ALTERing the same (or\ndifferent) MERGE tables to change the UNION could cause the server to crash\nor stall (CAN-2004-0837).\n\nSergei Golubchik discovered that if a user is granted privileges to a\ndatabase with a name containing an underscore (\"_\"), the user also gains\nthe ability to grant privileges to other databases with similar names\n(CAN-2004-0957).\n\nUsers of mysql-server should upgrade to these erratum packages, which\ncorrect these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:611", "url": "https://access.redhat.com/errata/RHSA-2004:611" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "135372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=135372" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_611.json" } ], "title": "Red Hat Security Advisory: mysql-server security update", "tracking": { "current_release_date": "2024-11-14T10:03:21+00:00", "generator": { "date": "2024-11-14T10:03:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2004:611", "initial_release_date": "2004-10-27T15:18:00+00:00", "revision_history": [ { "date": "2004-10-27T15:18:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-10-27T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:03:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Desktop version 3 Extras", "product": { "name": "Red Hat Desktop version 3 Extras", "product_id": "Red Hat Desktop version 3 Extras", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0835", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617308" } ], "notes": [ { "category": "description", "text": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Desktop version 3 Extras" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0835" }, { "category": "external", "summary": "RHBZ#1617308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617308" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0835", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835" } ], "release_date": "2004-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-27T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.m", "product_ids": [ "Red Hat Desktop version 3 Extras" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0836", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617309" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Desktop version 3 Extras" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0836" }, { "category": "external", "summary": "RHBZ#1617309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617309" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0836", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836" } ], "release_date": "2004-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-27T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.m", "product_ids": [ "Red Hat Desktop version 3 Extras" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:611" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0837", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617310" } ], "notes": [ { "category": "description", "text": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Desktop version 3 Extras" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0837" }, { "category": "external", "summary": "RHBZ#1617310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0837", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837" } ], "release_date": "2004-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-27T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.m", "product_ids": [ "Red Hat Desktop version 3 Extras" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0957", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617330" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Desktop version 3 Extras" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0957" }, { "category": "external", "summary": "RHBZ#1617330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0957", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0957" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957" } ], "release_date": "2004-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-27T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.m", "product_ids": [ "Red Hat Desktop version 3 Extras" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:611" } ], "title": "security flaw" } ] }
rhsa-2004:597
Vulnerability from csaf_redhat
Published
2004-10-20 19:16
Modified
2024-11-21 23:15
Summary
Red Hat Security Advisory: mysql security update
Notes
Topic
Updated mysql packages that fix various security issues, as well as a
number of bugs, are now available for Red Hat Enterprise Linux 2.1.
Details
MySQL is a multi-user, multi-threaded SQL database server.
A number security issues that affect the mysql server have been reported:
Oleksandr Byelkin discovered that "ALTER TABLE ... RENAME" checked
the CREATE/INSERT rights of the old table instead of the new one. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0835 to this issue.
Lukasz Wojtow discovered a buffer overrun in the mysql_real_connect
function. In order to exploit this issue an attacker would need to force
the use of a malicious DNS server (CAN-2004-0836).
Dean Ellis discovered that multiple threads ALTERing the same (or
different) MERGE tables to change the UNION could cause the server to crash
or stall (CAN-2004-0837).
Sergei Golubchik discovered that if a user is granted privileges to a
database with a name containing an underscore ("_"), the user also gains
the ability to grant privileges to other databases with similar names
(CAN-2004-0957).
Additionally, the following minor temporary file vulnerabilities were
discovered:
- Stan Bubroski and Shaun Colley found a temporary file vulnerability in
the mysqlbug script (CAN-2004-0381).
- A temporary file vulnerability was discovered in mysqld_multi
(CAN-2004-0388).
- Jeroen van Wolffelaar discovered an temporary file vulnerability in the
mysqlhotcopy script when using the scp method (CAN-2004-0457).
All users of mysql should upgrade to these updated packages, which resolve
these issues and also include fixes for a number of small bugs.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated mysql packages that fix various security issues, as well as a\nnumber of bugs, are now available for Red Hat Enterprise Linux 2.1.", "title": "Topic" }, { "category": "general", "text": "MySQL is a multi-user, multi-threaded SQL database server.\n\nA number security issues that affect the mysql server have been reported: \n\nOleksandr Byelkin discovered that \"ALTER TABLE ... RENAME\" checked\nthe CREATE/INSERT rights of the old table instead of the new one. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2004-0835 to this issue.\n\nLukasz Wojtow discovered a buffer overrun in the mysql_real_connect\nfunction. In order to exploit this issue an attacker would need to force\nthe use of a malicious DNS server (CAN-2004-0836).\n\nDean Ellis discovered that multiple threads ALTERing the same (or\ndifferent) MERGE tables to change the UNION could cause the server to crash\nor stall (CAN-2004-0837).\n\nSergei Golubchik discovered that if a user is granted privileges to a\ndatabase with a name containing an underscore (\"_\"), the user also gains\nthe ability to grant privileges to other databases with similar names\n(CAN-2004-0957).\n\nAdditionally, the following minor temporary file vulnerabilities were\ndiscovered:\n \n- Stan Bubroski and Shaun Colley found a temporary file vulnerability in \n the mysqlbug script (CAN-2004-0381).\n- A temporary file vulnerability was discovered in mysqld_multi \n (CAN-2004-0388).\n- Jeroen van Wolffelaar discovered an temporary file vulnerability in the \n mysqlhotcopy script when using the scp method (CAN-2004-0457).\n\nAll users of mysql should upgrade to these updated packages, which resolve\nthese issues and also include fixes for a number of small bugs.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:597", "url": "https://access.redhat.com/errata/RHSA-2004:597" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "112693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=112693" }, { "category": "external", "summary": "113960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=113960" }, { "category": "external", "summary": "115165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=115165" }, { "category": "external", "summary": "124352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=124352" }, { "category": "external", "summary": "129409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=129409" }, { "category": "external", "summary": "130348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130348" }, { "category": "external", "summary": "135372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=135372" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_597.json" } ], "title": "Red Hat Security Advisory: mysql security update", "tracking": { "current_release_date": "2024-11-21T23:15:37+00:00", "generator": { "date": "2024-11-21T23:15:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2004:597", "initial_release_date": "2004-10-20T19:16:00+00:00", "revision_history": [ { "date": "2004-10-20T19:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-10-20T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:15:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0381", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617187" } ], "notes": [ { "category": "description", "text": "mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0381" }, { "category": "external", "summary": "RHBZ#1617187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0381", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0381" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0381", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0381" } ], "release_date": "2004-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0388", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617190" } ], "notes": [ { "category": "description", "text": "The mysqld_multi script in MySQL allows local users to overwrite arbitrary files via a symlink attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0388" }, { "category": "external", "summary": "RHBZ#1617190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0388", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0388" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0388", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0388" } ], "release_date": "2004-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0457", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617209" } ], "notes": [ { "category": "description", "text": "The mysqlhotcopy script in mysql 4.0.20 and earlier, when using the scp method from the mysql-server package, allows local users to overwrite arbitrary files via a symlink attack on temporary files.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0457" }, { "category": "external", "summary": "RHBZ#1617209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617209" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0457", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0457" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0457", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0457" } ], "release_date": "2004-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "title": "security flaw" }, { "cve": "CVE-2004-0835", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617308" } ], "notes": [ { "category": "description", "text": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0835" }, { "category": "external", "summary": "RHBZ#1617308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617308" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0835", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835" } ], "release_date": "2004-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0836", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617309" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0836" }, { "category": "external", "summary": "RHBZ#1617309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617309" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0836", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836" } ], "release_date": "2004-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0837", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617310" } ], "notes": [ { "category": "description", "text": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0837" }, { "category": "external", "summary": "RHBZ#1617310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0837", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837" } ], "release_date": "2004-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0957", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617330" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0957" }, { "category": "external", "summary": "RHBZ#1617330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0957", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0957" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957" } ], "release_date": "2004-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "title": "security flaw" } ] }
rhsa-2004:611
Vulnerability from csaf_redhat
Published
2004-10-27 15:18
Modified
2024-11-14 10:03
Summary
Red Hat Security Advisory: mysql-server security update
Notes
Topic
An updated mysql-server package that fixes various security issues is now
available in the Red Hat Enterprise Linux 3 Extras channel of Red Hat Network.
Details
MySQL is a multi-user, multi-threaded SQL database server.
A number of security issues that affect the mysql-server package have been
reported. Although Red Hat Enterprise Linux 3 does not ship with the
mysql-server package, the affected package is available from the Red Hat
Network Extras channel.
Oleksandr Byelkin discovered that "ALTER TABLE ... RENAME" checked
the CREATE/INSERT rights of the old table instead of the new one. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0835 to this issue.
Lukasz Wojtow discovered a buffer overrun in the mysql_real_connect
function. In order to exploit this issue an attacker would need to force
the use of a malicious DNS server (CAN-2004-0836).
Dean Ellis discovered that multiple threads ALTERing the same (or
different) MERGE tables to change the UNION could cause the server to crash
or stall (CAN-2004-0837).
Sergei Golubchik discovered that if a user is granted privileges to a
database with a name containing an underscore ("_"), the user also gains
the ability to grant privileges to other databases with similar names
(CAN-2004-0957).
Users of mysql-server should upgrade to these erratum packages, which
correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated mysql-server package that fixes various security issues is now\navailable in the Red Hat Enterprise Linux 3 Extras channel of Red Hat Network.", "title": "Topic" }, { "category": "general", "text": "MySQL is a multi-user, multi-threaded SQL database server.\n\nA number of security issues that affect the mysql-server package have been\nreported. Although Red Hat Enterprise Linux 3 does not ship with the\nmysql-server package, the affected package is available from the Red Hat\nNetwork Extras channel. \n\nOleksandr Byelkin discovered that \"ALTER TABLE ... RENAME\" checked\nthe CREATE/INSERT rights of the old table instead of the new one. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2004-0835 to this issue.\n\nLukasz Wojtow discovered a buffer overrun in the mysql_real_connect\nfunction. In order to exploit this issue an attacker would need to force\nthe use of a malicious DNS server (CAN-2004-0836).\n\nDean Ellis discovered that multiple threads ALTERing the same (or\ndifferent) MERGE tables to change the UNION could cause the server to crash\nor stall (CAN-2004-0837).\n\nSergei Golubchik discovered that if a user is granted privileges to a\ndatabase with a name containing an underscore (\"_\"), the user also gains\nthe ability to grant privileges to other databases with similar names\n(CAN-2004-0957).\n\nUsers of mysql-server should upgrade to these erratum packages, which\ncorrect these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:611", "url": "https://access.redhat.com/errata/RHSA-2004:611" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "135372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=135372" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_611.json" } ], "title": "Red Hat Security Advisory: mysql-server security update", "tracking": { "current_release_date": "2024-11-14T10:03:21+00:00", "generator": { "date": "2024-11-14T10:03:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2004:611", "initial_release_date": "2004-10-27T15:18:00+00:00", "revision_history": [ { "date": "2004-10-27T15:18:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-10-27T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:03:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Desktop version 3 Extras", "product": { "name": "Red Hat Desktop version 3 Extras", "product_id": "Red Hat Desktop version 3 Extras", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0835", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617308" } ], "notes": [ { "category": "description", "text": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Desktop version 3 Extras" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0835" }, { "category": "external", "summary": "RHBZ#1617308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617308" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0835", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835" } ], "release_date": "2004-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-27T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.m", "product_ids": [ "Red Hat Desktop version 3 Extras" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0836", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617309" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Desktop version 3 Extras" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0836" }, { "category": "external", "summary": "RHBZ#1617309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617309" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0836", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836" } ], "release_date": "2004-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-27T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.m", "product_ids": [ "Red Hat Desktop version 3 Extras" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:611" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0837", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617310" } ], "notes": [ { "category": "description", "text": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Desktop version 3 Extras" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0837" }, { "category": "external", "summary": "RHBZ#1617310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0837", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837" } ], "release_date": "2004-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-27T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.m", "product_ids": [ "Red Hat Desktop version 3 Extras" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0957", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617330" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Desktop version 3 Extras" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0957" }, { "category": "external", "summary": "RHBZ#1617330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0957", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0957" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957" } ], "release_date": "2004-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-27T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.m", "product_ids": [ "Red Hat Desktop version 3 Extras" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:611" } ], "title": "security flaw" } ] }
rhsa-2004_597
Vulnerability from csaf_redhat
Published
2004-10-20 19:16
Modified
2024-11-21 23:15
Summary
Red Hat Security Advisory: mysql security update
Notes
Topic
Updated mysql packages that fix various security issues, as well as a
number of bugs, are now available for Red Hat Enterprise Linux 2.1.
Details
MySQL is a multi-user, multi-threaded SQL database server.
A number security issues that affect the mysql server have been reported:
Oleksandr Byelkin discovered that "ALTER TABLE ... RENAME" checked
the CREATE/INSERT rights of the old table instead of the new one. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0835 to this issue.
Lukasz Wojtow discovered a buffer overrun in the mysql_real_connect
function. In order to exploit this issue an attacker would need to force
the use of a malicious DNS server (CAN-2004-0836).
Dean Ellis discovered that multiple threads ALTERing the same (or
different) MERGE tables to change the UNION could cause the server to crash
or stall (CAN-2004-0837).
Sergei Golubchik discovered that if a user is granted privileges to a
database with a name containing an underscore ("_"), the user also gains
the ability to grant privileges to other databases with similar names
(CAN-2004-0957).
Additionally, the following minor temporary file vulnerabilities were
discovered:
- Stan Bubroski and Shaun Colley found a temporary file vulnerability in
the mysqlbug script (CAN-2004-0381).
- A temporary file vulnerability was discovered in mysqld_multi
(CAN-2004-0388).
- Jeroen van Wolffelaar discovered an temporary file vulnerability in the
mysqlhotcopy script when using the scp method (CAN-2004-0457).
All users of mysql should upgrade to these updated packages, which resolve
these issues and also include fixes for a number of small bugs.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated mysql packages that fix various security issues, as well as a\nnumber of bugs, are now available for Red Hat Enterprise Linux 2.1.", "title": "Topic" }, { "category": "general", "text": "MySQL is a multi-user, multi-threaded SQL database server.\n\nA number security issues that affect the mysql server have been reported: \n\nOleksandr Byelkin discovered that \"ALTER TABLE ... RENAME\" checked\nthe CREATE/INSERT rights of the old table instead of the new one. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2004-0835 to this issue.\n\nLukasz Wojtow discovered a buffer overrun in the mysql_real_connect\nfunction. In order to exploit this issue an attacker would need to force\nthe use of a malicious DNS server (CAN-2004-0836).\n\nDean Ellis discovered that multiple threads ALTERing the same (or\ndifferent) MERGE tables to change the UNION could cause the server to crash\nor stall (CAN-2004-0837).\n\nSergei Golubchik discovered that if a user is granted privileges to a\ndatabase with a name containing an underscore (\"_\"), the user also gains\nthe ability to grant privileges to other databases with similar names\n(CAN-2004-0957).\n\nAdditionally, the following minor temporary file vulnerabilities were\ndiscovered:\n \n- Stan Bubroski and Shaun Colley found a temporary file vulnerability in \n the mysqlbug script (CAN-2004-0381).\n- A temporary file vulnerability was discovered in mysqld_multi \n (CAN-2004-0388).\n- Jeroen van Wolffelaar discovered an temporary file vulnerability in the \n mysqlhotcopy script when using the scp method (CAN-2004-0457).\n\nAll users of mysql should upgrade to these updated packages, which resolve\nthese issues and also include fixes for a number of small bugs.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:597", "url": "https://access.redhat.com/errata/RHSA-2004:597" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "112693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=112693" }, { "category": "external", "summary": "113960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=113960" }, { "category": "external", "summary": "115165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=115165" }, { "category": "external", "summary": "124352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=124352" }, { "category": "external", "summary": "129409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=129409" }, { "category": "external", "summary": "130348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130348" }, { "category": "external", "summary": "135372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=135372" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_597.json" } ], "title": "Red Hat Security Advisory: mysql security update", "tracking": { "current_release_date": "2024-11-21T23:15:37+00:00", "generator": { "date": "2024-11-21T23:15:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2004:597", "initial_release_date": "2004-10-20T19:16:00+00:00", "revision_history": [ { "date": "2004-10-20T19:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-10-20T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:15:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0381", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617187" } ], "notes": [ { "category": "description", "text": "mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0381" }, { "category": "external", "summary": "RHBZ#1617187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0381", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0381" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0381", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0381" } ], "release_date": "2004-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0388", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617190" } ], "notes": [ { "category": "description", "text": "The mysqld_multi script in MySQL allows local users to overwrite arbitrary files via a symlink attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0388" }, { "category": "external", "summary": "RHBZ#1617190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0388", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0388" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0388", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0388" } ], "release_date": "2004-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0457", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617209" } ], "notes": [ { "category": "description", "text": "The mysqlhotcopy script in mysql 4.0.20 and earlier, when using the scp method from the mysql-server package, allows local users to overwrite arbitrary files via a symlink attack on temporary files.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0457" }, { "category": "external", "summary": "RHBZ#1617209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617209" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0457", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0457" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0457", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0457" } ], "release_date": "2004-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "title": "security flaw" }, { "cve": "CVE-2004-0835", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617308" } ], "notes": [ { "category": "description", "text": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0835" }, { "category": "external", "summary": "RHBZ#1617308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617308" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0835", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835" } ], "release_date": "2004-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0836", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617309" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0836" }, { "category": "external", "summary": "RHBZ#1617309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617309" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0836", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836" } ], "release_date": "2004-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0837", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617310" } ], "notes": [ { "category": "description", "text": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0837" }, { "category": "external", "summary": "RHBZ#1617310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0837", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837" } ], "release_date": "2004-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0957", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617330" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0957" }, { "category": "external", "summary": "RHBZ#1617330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0957", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0957" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957" } ], "release_date": "2004-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-20T19:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:597" } ], "title": "security flaw" } ] }
ghsa-8p34-xxjh-4hrg
Vulnerability from github
Published
2022-04-29 02:58
Modified
2022-04-29 02:58
Details
MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.
{ "affected": [], "aliases": [ "CVE-2004-0837" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2004-11-03T05:00:00Z", "severity": "LOW" }, "details": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.", "id": "GHSA-8p34-xxjh-4hrg", "modified": "2022-04-29T02:58:27Z", "published": "2022-04-29T02:58:27Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" }, { "type": "WEB", "url": "http://bugs.mysql.com/2408" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "type": "WEB", "url": "http://lists.mysql.com/internals/16168" }, { "type": "WEB", "url": "http://lists.mysql.com/internals/16173" }, { "type": "WEB", "url": "http://lists.mysql.com/internals/16174" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "type": "WEB", "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15" }, { "type": "WEB", "url": "http://secunia.com/advisories/12783" }, { "type": "WEB", "url": "http://securitytracker.com/id?1011606" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "type": "WEB", "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-562" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/11357" }, { "type": "WEB", "url": "http://www.trustix.org/errata/2004/0054" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2004-0837
Vulnerability from fkie_nvd
Published
2004-11-03 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4E0733B-5C1C-4579-9FD2-251E45E8D93F", "versionEndExcluding": "3.23.49", "versionStartIncluding": "3.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9CB33C2-B487-4DC3-A7F4-4A9D61EA12FD", "versionEndExcluding": "4.0.21", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs." }, { "lang": "es", "value": "MySQL 4 anteriores a 4.0.21 y 3.x anteriores a 3.23.49 permiten a atacantes causar una denegaci\u00f3n de servicio (ca\u00edda o cuelgue) mediante m\u00faltiples hilos de ejecuci\u00f3n que alter\u00e1n simultaneamente UNIONes de tablas MERGE." } ], "id": "CVE-2004-0837", "lastModified": "2024-11-20T23:49:31.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-11-03T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://bugs.mysql.com/2408" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16168" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16173" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16174" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/12783/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1011606" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/11357" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://bugs.mysql.com/2408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/12783/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1011606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/11357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2004-0837
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2004-0837", "description": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.", "id": "GSD-2004-0837", "references": [ "https://www.suse.com/security/cve/CVE-2004-0837.html", "https://www.debian.org/security/2004/dsa-562", "https://access.redhat.com/errata/RHSA-2004:611", "https://access.redhat.com/errata/RHSA-2004:597" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-0837" ], "details": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.", "id": "GSD-2004-0837", "modified": "2023-12-13T01:22:53.998453Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0837", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.mysql.com/internals/16174", "refsource": "MISC", "url": "http://lists.mysql.com/internals/16174" }, { "name": "RHSA-2004:611", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "name": "12783", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12783/" }, { "name": "DSA-562", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-562" }, { "name": "20041125 [USN-32-1] mysql vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "name": "http://lists.mysql.com/internals/16173", "refsource": "MISC", "url": "http://lists.mysql.com/internals/16173" }, { "name": "mysql-union-dos(17667)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" }, { "name": "101864", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "11357", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11357" }, { "name": "CLA-2004:892", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "name": "RHSA-2004:597", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "name": "http://lists.mysql.com/internals/16168", "refsource": "MISC", "url": "http://lists.mysql.com/internals/16168" }, { "name": "GLSA-200410-22", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "name": "2004-0054", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0054/" }, { "name": "http://bugs.mysql.com/2408", "refsource": "MISC", "url": "http://bugs.mysql.com/2408" }, { "name": "1011606", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1011606" }, { "name": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15", "refsource": "MISC", "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.0.21", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.23.49", "versionStartIncluding": "3.20", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0837" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-562", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "name": "RHSA-2004:597", "refsource": "REDHAT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "2004-0054", "refsource": "TRUSTIX", "tags": [ "Broken Link" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "name": "GLSA-200410-22", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "name": "http://bugs.mysql.com/2408", "refsource": "MISC", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://bugs.mysql.com/2408" }, { "name": "http://lists.mysql.com/internals/16168", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16168" }, { "name": "http://lists.mysql.com/internals/16173", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16173" }, { "name": "http://lists.mysql.com/internals/16174", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16174" }, { "name": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15" }, { "name": "RHSA-2004:611", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "name": "11357", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/11357" }, { "name": "12783", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/12783/" }, { "name": "1011606", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1011606" }, { "name": "P-018", "refsource": "CIAC", "tags": [ "Broken Link" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "name": "CLA-2004:892", "refsource": "CONECTIVA", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "name": "101864", "refsource": "SUNALERT", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "20041125 [USN-32-1] mysql vulnerabilities", "refsource": "BUGTRAQ", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "name": "mysql-union-dos(17667)", "refsource": "XF", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2019-12-17T17:11Z", "publishedDate": "2004-11-03T05:00Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.