- Description
- MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:P/I:P/A:P
- nvd@nist.gov
- CWE-264
- Hype score
- Not currently trending
- Comment
- Per http://www.securityfocus.com/bid/29106 and http://secunia.com/advisories/32222, this vulnerability is remotely exploitable.
- Impact
- -
- Solution
- -
- Red HatThis issue did not affect MySQL as supplied with Red Hat Enterprise Linux 3. This issue was addressed for Red Hat Enterprise Linux 4, 5, and Red Hat Application Stack v1, v2: https://rhn.redhat.com/cve/CVE-2008-2079.html
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "56C895D3-2949-4B14-B059-F0E29D977982",
"versionEndExcluding": "4.1.24",
"versionStartIncluding": "4.1.0"
},
{
"criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "027481EF-83CF-40AF-8223-572B7915845F",
"versionEndExcluding": "5.0.60",
"versionStartIncluding": "5.0.0"
},
{
"criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7F5416CD-0CEB-4C41-AE28-2A9C2B5600A7",
"versionEndExcluding": "5.1.24",
"versionStartIncluding": "5.1.0"
},
{
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CA6A87CA-DA11-4B91-A3E9-6437042BDC1A",
"versionEndExcluding": "6.0.5",
"versionStartIncluding": "6.0.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF"
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468"
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701"
}
],
"operator": "OR"
}
]
}
]