Gentoo: mysql multiple vulnerabilities

    Date16 Dec 2002
    Posted ByLinuxSecurity Advisories
    There are multiple vulnerabilities in MySQL.
    - --------------------------------------------------------------------
    - --------------------------------------------------------------------
    PACKAGE : mysql
    SUMMARY : remote DOS and arbitrary code execution
    DATE    : 2002-12-15 12:12 UTC
    EXPLOIT : remote
    - --------------------------------------------------------------------
    From e-matters advisory:
    "We have discovered two flaws within the MySQL server that can be used
    by any MySQL user to crash the server. Furthermore one of the flaws can
    be used to bypass the MySQL password check or to execute arbitrary code
    with the privileges of the user running mysqld.
    We have also discovered an arbitrary size heap overflow within the mysql
    client library and another vulnerability that allows to write '\0' to any
    memory address. Both flaws could allow DOS attacks against or arbitrary
    code execution within anything linked against libmysqlclient."
    Read the full advisory at
    It is recommended that all Gentoo Linux users who are running
    net-misc/freeswan-3.23.53 and earlier update their systems as follows:
    emerge rsync
    emerge mysql
    emerge clean
    - --------------------------------------------------------------------
    This email address is being protected from spambots. You need JavaScript enabled to view it. - GnuPG key is available at
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    - --------------------------------------------------------------------
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.