The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Immunix Secured OS 7+ MySQL update


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 10 Apr 2003 00:16:12 -0700
From: WireX Security Team <[email protected]>
To: [email protected], [email protected],
Subject: Immunix Secured OS 7+ MySQL update

--=-SmGY8vxieypuBQjuYus2
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

-----------------------------------------------------------------------
	Immunix Secured OS Security Advisory

Packages updated:	mysql
			mysqlclient9
Affected products:	7+
Bugs fixed:		CAN-2002-1373
			CAN-2002-1374
			CAN-2002-1375
			CAN-2002-1376
Date:			Tue Apr  8 2003
Advisory ID:		IMNX-2003-7+-008-01
Author:			Alan Olsen
-----------------------------------------------------------------------

Description:
  There have been a number of vulnerabilities found in MySQL and the MySQL=20
  Client package.
 =20
  Unfortunately, Immunix does not protect against all of these problems.
  Our recomendation is to upgrade these packages immediately. =20
 =20
  CAN-2002-1373
  Signed integer vulnerability in the COM_TABLE_DUMP package for MySQL=20
  3.23.x before 3.23.54 allows remote attackers to cause a denial of servic=
e=20
  (crash or hang) in mysqld by causing large negative integers to be=20
  provided to a memcpy call.
 =20
  CAN-2002-1374
  The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before=20
  4.0.6, allows remote attackers to gain privileges via a brute force attac=
k=20
  using a one-character password, which causes MySQL to only compare the=20
  provided password against the first character of the real password.
 =20
  CAN-2002-1375
  The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6=
,=20
  allows remote attackers to execute arbitrary code via a long response.
 =20
  CAN-2002-1376
  libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6,=20
  does not properly verify length fields for certain responses in the (1)=20
  read_rows or (2) read_one_row routines, which allows remote attackers to=20
  cause a denial of service and possibly execute arbitrary code.
 =20
 =20
Package names and locations:
  Precompiled binary packages for Immunix 7+ are available at:

  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-3.23.54a-3.70=
_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-devel-3.23.54=
a-3.70_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-server-3.23.5=
4a-3.70_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysqlclient9-3.23.2=
2-8_imnx_1.i386.rpm

Immunix OS 7+ md5sums:
  6663ff1a67627810d06c82f667f199fc  mysql-3.23.54a-3.70_imnx_1.i386.rpm
  997db1d0e02aabc1da5aac79f3120e2e  mysql-devel-3.23.54a-3.70_imnx_1.i386.r=
pm
  728f760e70b718fd29e4e14027e9070e  mysql-server-3.23.54a-3.70_imnx_1.i386.=
rpm
  7055336008114ceec23872238412882d  mysqlclient9-3.23.22-8_imnx_1.i386.rpm


GPG verification:                                                          =
    =20
  Our public key is available at <http://wirex.com/security/GPG_KEY>;.      =
    =20

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

  ImmunixOS 6.2 is no longer officially supported.
  ImmunixOS 7.0 is no longer officially supported.

Contact information:
  To report vulnerabilities, please contact [email protected]. WireX=20
  attempts to conform to the RFP vulnerability disclosure protocol
  <http://www.wiretrip.net/rfp/policy.html>;.




--=-SmGY8vxieypuBQjuYus2
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQA+lRo8VQcWL60UVMsRAlQoAJsEcKDtr2ofxs9C/+B+LK0LAVEWbwCcC8z5
7VVosTg0m4C+SUVMG8k1IJc=
=ibY1
-----END PGP SIGNATURE-----

--=-SmGY8vxieypuBQjuYus2--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру