|
Message-ID: <Pine.GSO.4.51.0805051129470.17161@faron.mitre.org> Date: Mon, 5 May 2008 11:30:49 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: Tomas Hoger <thoger@...hat.com> cc: oss-security@...ts.openwall.com, coley@...re.org Subject: Re: CVE id request - mysql Interesting bug. I agree that the overflow enhancement does not deserve a CVE when the only known attacks do not cross privilege boundaries. - Steve ====================================================== Name: CVE-2008-2079 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079 Reference: CONFIRM:http://bugs.mysql.com/bug.php?id=32167 Reference: CONFIRM:http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html Reference: CONFIRM:http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html Reference: CONFIRM:http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html Reference: CONFIRM:http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.