Date: Mon, 29 Jan 2001 11:04:33 -0700
From: Caldera Support Info <[email protected]>
To: [email protected]Subject: CSSA-2001-006.0 MySQL buffer overflow
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: MySQL buffer overflow
Advisory number: CSSA-2001-006.0
Issue date: 2001 January, 29
Cross reference:
______________________________________________________________________________
1. Problem Description
There is a buffer overflow in the MySQL server that allows
an attacker to gain access to the mysql account. A valid mysql account
is required for this attack. An exploit for this problem has been
published on bugtraq.
Note that a second vulnerability is currently being discussed
on various mailing lists relating to the SHOW GRANTS command.
This command is not supported in MySQL versions currently shipped
by Caldera, so this second vulnerability does not affect OpenLinux.
2. Vulnerable Versions
System Package
-----------------------------------------------------------
OpenLinux eDesktop 2.3.1 All packages previous to
mysql-3.22.32-3S
OpenLinux eDesktop 2.4 All packages previous to
mysql-3.22.32-3
OpenLinux Desktop 2.3 is not affected.
3. Solution
Workaround
none
The proper solution is to upgrade to the latest packages.
4. OpenLinux eServer 2.3.1 and OpenLinux eBuilder for ECential 3.0
4.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS
4.2 Verification
940afe2a243e2c568aef4dddbbb56a41 RPMS/mysql-3.22.32-3S.i386.rpm
6930d7617efe5aedd759ccf7271198b6 RPMS/mysql-bench-3.22.32-3S.i386.rpm
d1cf0ed011437ad97cc9beef06b67398 RPMS/mysql-client-3.22.32-3S.i386.rpm
d766bdb5d048e219d0897d4ea73f7b1b RPMS/mysql-devel-3.22.32-3S.i386.rpm
dbf7d36a5860386ab5f48fe32004aa28 SRPMS/mysql-3.22.32-3S.src.rpm
4.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -F mysql-devel-3.22.32-3S.i386.rpm
rpm -F mysql-bench-3.22.32-3S.i386.rpm
rpm -F --force mysql-client-3.22.32-3S.i386.rpm
rpm -F mysql-3.22.32-3S.i386.rpm
5. OpenLinux eDesktop 2.4
5.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS
5.2 Verification
fb5d46fc477ec41919d915461a4e2198 RPMS/mysql-3.22.32-3.i386.rpm
845ce2c207ba9d2256c34e1d6bf078f0 RPMS/mysql-bench-3.22.32-3.i386.rpm
63ea2d09208015029c2f6886b1a27f42 RPMS/mysql-client-3.22.32-3.i386.rpm
af4b2e3d7b8108b19060bfe9059a33d2 RPMS/mysql-devel-3.22.32-3.i386.rpm
55deea47b0e5c259e8ef6ea6f6dd8dc8 SRPMS/mysql-3.22.32-3.src.rpm
5.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -F mysql-devel-3.22.32-3.i386.rpm
rpm -F mysql-bench-3.22.32-3.i386.rpm
rpm -F --force mysql-client-3.22.32-3.i386.rpm
rpm -F mysql-3.22.32-3.i386.rpm
6. References
This and other Caldera security resources are located at:
http://www.calderasystems.com/support/security/index.html
This security fix closes Caldera's internal Problem Report 8889.
7. Disclaimer
Caldera Systems, Inc. is not responsible for the misuse of any of the
information we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended to
promote secure installation and use of Caldera OpenLinux.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE6dTJ+18sy83A/qfwRAmN7AJwOTpyi9dctOp8tuYHfsCcfLcIg4wCdFLCA
IPOtZB9Khg0RfzILB5G6Ctc=
=pd27
-----END PGP SIGNATURE-----