CVE-2007-5969
Published Dec 10, 2007
Last updated a year ago
Overview
- Description
- MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql_server:5.1.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB22F327-7795-4B25-B40E-5684F2A5B0BE" }, { "criteria": "cpe:2.3:a:mysql:mysql_server:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0714FFD1-72F8-40DA-8BD9-80A160B4EBE3" }, { "criteria": "cpe:2.3:a:mysql:mysql_server:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B02C419-7843-4400-9223-B9632A183FCE" }, { "criteria": "cpe:2.3:a:mysql:mysql_server:6.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9FF4637-F6CF-40FD-AE36-EA8B9C1ECBB6" }, { "criteria": "cpe:2.3:a:mysql:mysql_server:6.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DF9852D-A35F-49A8-9886-49991DD864F2" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:community_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8ED15232-83F0-4A63-8E8B-79B0C2BF80F9", "versionEndIncluding": "5.0.50" }, { "criteria": "cpe:2.3:a:mysql:community_server:5.0.41:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FAA5C79-6D2D-45BF-A392-0EA4F9D3C727" }, { "criteria": "cpe:2.3:a:mysql:community_server:5.0.44:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E670333-0E50-42D5-8D67-B1F565FFD59A" }, { "criteria": "cpe:2.3:a:mysql:community_server:5.0.45:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C576BBB-9A3B-4BDD-A362-00F65627284A" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql_enterprise_server:5.0.50:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C003A85-4802-4B55-A7EA-5229A0FDEDB3" } ], "operator": "OR" } ] } ]