- Description
- MySQL 5.0.51a allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are associated with symlinks within pathnames for subdirectories of the MySQL home data directory, which are followed when tables are created in the future. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-2079.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:P/I:P/A:P
- nvd@nist.gov
- CWE-264
- Hype score
- Not currently trending
- Comment
- Per http://www.securityfocus.com/bid/29106 this vulnerability is remotely exploitable.
- Impact
- -
- Solution
- -
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.51a:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BD39950F-FBBF-4505-8FB5-EEF2886095F1"
}
],
"operator": "OR"
}
]
}
]