CVE-2008-2079
Published May 5, 2008
Last updated 5 years ago
Overview
- Description
- MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Evaluator
- Comment
- Per http://www.securityfocus.com/bid/29106 and http://secunia.com/advisories/32222, this vulnerability is remotely exploitable.
- Impact
- -
- Solution
- -
Vendor comments
- Red HatThis issue did not affect MySQL as supplied with Red Hat Enterprise Linux 3. This issue was addressed for Red Hat Enterprise Linux 4, 5, and Red Hat Application Stack v1, v2: https://rhn.redhat.com/cve/CVE-2008-2079.html
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56C895D3-2949-4B14-B059-F0E29D977982", "versionEndExcluding": "4.1.24", "versionStartIncluding": "4.1.0" }, { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "027481EF-83CF-40AF-8223-572B7915845F", "versionEndExcluding": "5.0.60", "versionStartIncluding": "5.0.0" }, { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F5416CD-0CEB-4C41-AE28-2A9C2B5600A7", "versionEndExcluding": "5.1.24", "versionStartIncluding": "5.1.0" }, { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA6A87CA-DA11-4B91-A3E9-6437042BDC1A", "versionEndExcluding": "6.0.5", "versionStartIncluding": "6.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701" } ], "operator": "OR" } ] } ]