Summary: | CAN-2005-0004 -- Mysqlaccess insecure temp file creation | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | John D <john.dong> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED DUPLICATE | ||
Severity: | major | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://lists.mysql.com/internals/20600 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
John D
2005-01-18 12:15:19 UTC
Javier Fernández-Sanguino Peña from the Debian Security Audit Project discovered a temporary file vulnerability in the mysqlaccess script of MySQL that could allow an unprivileged user to let root overwrite arbitrary files via a symlink attack and could also could unveil the contents of a temporary file which might contain sensitive information. http://www.vuxml.org/freebsd/ce109fd4-67f3-11d9-a9e7-0001020eed82.html VuXML from FreeBSD gives a nice chart of exactly what versions are affected. Patch available at the lists.mysql.com URL. Reproducible: Always Steps to Reproduce: 1. 2. 3. |