CVE-2005-0710
Published May 2, 2005
Last updated 5 years ago
Overview
- Description
- MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_init function.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7" }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC" }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67" }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320" } ], "operator": "OR" } ] } ]