Date: 10 Apr 2003 00:16:12 -0700
From: WireX Security Team <[email protected]>
To: [email protected], [email protected],
Subject: Immunix Secured OS 7+ MySQL update
--=-SmGY8vxieypuBQjuYus2
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable
-----------------------------------------------------------------------
Immunix Secured OS Security Advisory
Packages updated: mysql
mysqlclient9
Affected products: 7+
Bugs fixed: CAN-2002-1373
CAN-2002-1374
CAN-2002-1375
CAN-2002-1376
Date: Tue Apr 8 2003
Advisory ID: IMNX-2003-7+-008-01
Author: Alan Olsen
-----------------------------------------------------------------------
Description:
There have been a number of vulnerabilities found in MySQL and the MySQL=20
Client package.
=20
Unfortunately, Immunix does not protect against all of these problems.
Our recomendation is to upgrade these packages immediately. =20
=20
CAN-2002-1373
Signed integer vulnerability in the COM_TABLE_DUMP package for MySQL=20
3.23.x before 3.23.54 allows remote attackers to cause a denial of servic=
e=20
(crash or hang) in mysqld by causing large negative integers to be=20
provided to a memcpy call.
=20
CAN-2002-1374
The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before=20
4.0.6, allows remote attackers to gain privileges via a brute force attac=
k=20
using a one-character password, which causes MySQL to only compare the=20
provided password against the first character of the real password.
=20
CAN-2002-1375
The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6=
,=20
allows remote attackers to execute arbitrary code via a long response.
=20
CAN-2002-1376
libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6,=20
does not properly verify length fields for certain responses in the (1)=20
read_rows or (2) read_one_row routines, which allows remote attackers to=20
cause a denial of service and possibly execute arbitrary code.
=20
=20
Package names and locations:
Precompiled binary packages for Immunix 7+ are available at:
http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-3.23.54a-3.70=
_imnx_1.i386.rpm
http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-devel-3.23.54=
a-3.70_imnx_1.i386.rpm
http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-server-3.23.5=
4a-3.70_imnx_1.i386.rpm
http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysqlclient9-3.23.2=
2-8_imnx_1.i386.rpm
Immunix OS 7+ md5sums:
6663ff1a67627810d06c82f667f199fc mysql-3.23.54a-3.70_imnx_1.i386.rpm
997db1d0e02aabc1da5aac79f3120e2e mysql-devel-3.23.54a-3.70_imnx_1.i386.r=
pm
728f760e70b718fd29e4e14027e9070e mysql-server-3.23.54a-3.70_imnx_1.i386.=
rpm
7055336008114ceec23872238412882d mysqlclient9-3.23.22-8_imnx_1.i386.rpm
GPG verification: =
=20
Our public key is available at <http://wirex.com/security/GPG_KEY>. =
=20
NOTE:
Ibiblio is graciously mirroring our updates, so if the links above are
slow, please try:
ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
or one of the many mirrors available at:
http://www.ibiblio.org/pub/Linux/MIRRORS.html
ImmunixOS 6.2 is no longer officially supported.
ImmunixOS 7.0 is no longer officially supported.
Contact information:
To report vulnerabilities, please contact [email protected]. WireX=20
attempts to conform to the RFP vulnerability disclosure protocol
<http://www.wiretrip.net/rfp/policy.html>.
--=-SmGY8vxieypuBQjuYus2
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQA+lRo8VQcWL60UVMsRAlQoAJsEcKDtr2ofxs9C/+B+LK0LAVEWbwCcC8z5
7VVosTg0m4C+SUVMG8k1IJc=
=ibY1
-----END PGP SIGNATURE-----
--=-SmGY8vxieypuBQjuYus2--