CVE-2008-2079
Severity:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
05/05/2008
Last modified:
17/12/2019
Description
MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
Impact
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:* | 4.1.0 (including) | 4.1.24 (excluding) |
cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:* | 5.0.0 (including) | 5.0.60 (excluding) |
cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:* | 5.1.0 (including) | 5.1.24 (excluding) |
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 6.0.0 (including) | 6.0.5 (excluding) |
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.mysql.com/bug.php?id=32167
- http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html
- http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html
- http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html
- http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html
- http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
- http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
- http://secunia.com/advisories/30134
- http://secunia.com/advisories/31066
- http://secunia.com/advisories/31226
- http://secunia.com/advisories/31687
- http://secunia.com/advisories/32222
- http://secunia.com/advisories/32769
- http://secunia.com/advisories/36566
- http://secunia.com/advisories/36701
- http://support.apple.com/kb/HT3216
- http://support.apple.com/kb/HT3865
- http://www.debian.org/security/2008/dsa-1608
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A149
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A150
- http://www.redhat.com/support/errata/RHSA-2008-0505.html
- http://www.redhat.com/support/errata/RHSA-2008-0510.html
- http://www.redhat.com/support/errata/RHSA-2008-0768.html
- http://www.redhat.com/support/errata/RHSA-2009-1289.html
- http://www.securityfocus.com/bid/29106
- http://www.securityfocus.com/bid/31681
- http://www.securitytracker.com/id?1019995=
- http://www.ubuntu.com/usn/USN-671-1
- http://www.vupen.com/english/advisories/2008/1472/references
- http://www.vupen.com/english/advisories/2008/2780
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42267
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133