[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030915100100.B684C9FBC5@noc.internal.fairytale.se>
Date: Mon, 15 Sep 2003 12:01:00 +0200 (CEST)
From: aliz@...too.org (Daniel Ahlberg)
To: gentoo-announce@...too.org, bugtraq@...urityfocus.com,
full-disclosure@...ts.netsys.com
Subject: GLSA: mysql (200309-08)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-08
- - - ---------------------------------------------------------------------
PACKAGE : mysql
SUMMARY : buffer overflow
DATE : 2003-09-15 10:00 UTC
EXPLOIT : remote
VERSIONS AFFECTED : <mysql-3.23.57-r1 <mysql-4.0.13-r4 >=mysql-4.0.14-r2(masked)
FIXED VERSION : >=mysql-3.23.57-r1 >=mysql-4.0.13-r4 >=mysql-4.0.14-r2(masked)
CVE : CAN-2003-0780
- - - ---------------------------------------------------------------------
quote from advisory:
"Anyone with global administrative privileges on a MySQL server may
execute arbitrary code even on a host he isn't supposed to have a shell
on, with the privileges of the system account running the MySQL server."
read the full advisory at:
http://www.securityfocus.com/archive/1/337012
SOLUTION
It is recommended that all Gentoo Linux users who are running
dev-db/mysql upgrade to either one of these versions:
3.23.x - mysql-3.23.57-r1
4.0.x - mysql-4.0.13-r4 OR
mysql-4.0.14-r2 if accepting "~" keywords.
emerge sync
emerge \=dev-db/mysql/<mysql version>
emerge clean
- - - ---------------------------------------------------------------------
aliz@...too.org - GnuPG key is available at http://dev.gentoo.org/~aliz
solar@...too.org
- - - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
iD8DBQE/ZY3cfT7nyhUpoZMRAjpJAJ0ZTUg/pJxdsWeIpxTJX/cDMatkEQCeKmFU
GGrAKtwqtPNuiguwyhelHys=
=uFLV
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists