blob: 568dbdc1ff288f1554f8bf7c10a27ec631da988a [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200708-10">
<title>MySQL: Denial of Service and information leakage</title>
A Denial of Service vulnerability and a table structure information leakage
vulnerability were found in MySQL.
<product type="ebuild">mysql</product>
<announced>August 16, 2007</announced>
<revised>August 16, 2007: 01</revised>
<package name="dev-db/mysql" auto="yes" arch="*">
<unaffected range="ge">5.0.44</unaffected>
<vulnerable range="lt">5.0.44</vulnerable>
MySQL is a popular multi-threaded, multi-user SQL server.
Dormando reported a vulnerability within the handling of password
packets in the connection protocol (CVE-2007-3780). Andrei Elkin also
found that the "CREATE TABLE LIKE" command didn't require SELECT
privileges on the source table (CVE-2007-3781).
<impact type="normal">
A remote unauthenticated attacker could use the first vulnerability to
make the server crash. The second vulnerability can be used by
authenticated users to obtain information on tables they are not
normally able to access.
There is no known workaround at this time.
All MySQL users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-5.0.44&quot;</code>
<uri link="">CVE-2007-3780</uri>
<uri link="">CVE-2007-3781</uri>
<metadata tag="requester" timestamp="Sun, 29 Jul 2007 22:18:26 +0000">
<metadata tag="submitter" timestamp="Sun, 12 Aug 2007 20:12:02 +0000">
<metadata tag="bugReady" timestamp="Sun, 12 Aug 2007 20:13:00 +0000">