lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1049949475.2560.9.camel@dhcp-253.int.wirex.com>
Date: 09 Apr 2003 21:37:55 -0700
From: WireX Security <security@...ex.com>
To: bugtraq@...urityfocus.com, immunix-announce@...unix.org,
	linsec@...ts.seifried.org
Subject: Immunix Secured OS 7+ MySQL update

-----------------------------------------------------------------------
	Immunix Secured OS Security Advisory

Packages updated:	mysql
			mysqlclient9
Affected products:	7+
Bugs fixed:		CAN-2002-1373
			CAN-2002-1374
			CAN-2002-1375
			CAN-2002-1376
Date:			Tue Apr  8 2003
Advisory ID:		IMNX-2003-7+-008-01
Author:			Alan Olsen
-----------------------------------------------------------------------

Description:
  There have been a number of vulnerabilities found in MySQL and the MySQL 
  Client package.
  
  Unfortunately, Immunix does not protect against all of these problems.
  Our recomendation is to upgrade these packages immediately.  
  
  CAN-2002-1373
  Signed integer vulnerability in the COM_TABLE_DUMP package for MySQL 
  3.23.x before 3.23.54 allows remote attackers to cause a denial of service 
  (crash or hang) in mysqld by causing large negative integers to be 
  provided to a memcpy call.
  
  CAN-2002-1374
  The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 
  4.0.6, allows remote attackers to gain privileges via a brute force attack 
  using a one-character password, which causes MySQL to only compare the 
  provided password against the first character of the real password.
  
  CAN-2002-1375
  The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6, 
  allows remote attackers to execute arbitrary code via a long response.
  
  CAN-2002-1376
  libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6, 
  does not properly verify length fields for certain responses in the (1) 
  read_rows or (2) read_one_row routines, which allows remote attackers to 
  cause a denial of service and possibly execute arbitrary code.
  
  
Package names and locations:
  Precompiled binary packages for Immunix 7+ are available at:

  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-3.23.54a-3.70_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-devel-3.23.54a-3.70_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-server-3.23.54a-3.70_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysqlclient9-3.23.22-8_imnx_1.i386.rpm

Immunix OS 7+ md5sums:
  6663ff1a67627810d06c82f667f199fc  mysql-3.23.54a-3.70_imnx_1.i386.rpm
  997db1d0e02aabc1da5aac79f3120e2e  mysql-devel-3.23.54a-3.70_imnx_1.i386.rpm
  728f760e70b718fd29e4e14027e9070e  mysql-server-3.23.54a-3.70_imnx_1.i386.rpm
  7055336008114ceec23872238412882d  mysqlclient9-3.23.22-8_imnx_1.i386.rpm


GPG verification:                                                               
  Our public key is available at <http://wirex.com/security/GPG_KEY>.           

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

  ImmunixOS 6.2 is no longer officially supported.
  ImmunixOS 7.0 is no longer officially supported.

Contact information:
  To report vulnerabilities, please contact security@...ex.com. WireX 
  attempts to conform to the RFP vulnerability disclosure protocol
  <http://www.wiretrip.net/rfp/policy.html>.




Download attachment "signature.asc" of type "application/pgp-signature" (233 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ