MySQL - 5.0.88 Multiple Vulnerabalities

2009-12-02 / 2009-12-03
Risk: Medium
Local: No
Remote: Yes

MySQL upstream has released latest 5.0.88 version of their Community Server, fixing one security issue: Security Fix: MySQL clients linked against OpenSSL did not check server certificates presented by a server linked against yaSSL. (Bug#47320: http://bugs.mysql.com/47320) While the other two (three issues) looks too to be security relevant: * Error handling was missing for SELECT statements containing subqueries in the WHERE clause and that assigned a SELECT result to a user variable. The server could crash as a result. (Bug#48291: http://bugs.mysql.com/48291) This looks to be from adjacent network exploitable mysqld DoS. * If the first argument to GeomFromWKB() function was a geometry value, the function just returned its value. However, it failed to preserve the argument's null_value flag, which caused an unexpected NULL value to be returned to the caller, resulting in a server crash. (Bug#47780: http://bugs.mysql.com/47780) Same case as the above, though I can't look into upstream MySQL bugs to confirm or disprove it. Thus Cc-ed Sergei Golubchik on this mail. * Failure to treat BIT values as unsigned could lead to unpredictable results. (Bug#42803: http://bugs.mysql.com/42803) Also this one seems to be security related - upstream bug speaks about invalid memory access and didn't check the code if this could lead to heap overflow once the comparison fails. Sergei, our opinion here is appreciated. Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team

References:

http://www.openwall.com/lists/oss-security/2009/11/23/16
http://www.openwall.com/lists/oss-security/2009/11/19/3
http://marc.info/?l=oss-security&m=125881733826437&w=2
http://lists.mysql.com/commits/87446
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html
http://bugs.mysql.com/47320


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top