Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 5 May 2008 11:30:49 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: Tomas Hoger <thoger@...hat.com>
cc: oss-security@...ts.openwall.com, coley@...re.org
Subject: Re: CVE id request - mysql


Interesting bug.

I agree that the overflow enhancement does not deserve a CVE when the only
known attacks do not cross privilege boundaries.

- Steve


======================================================
Name: CVE-2008-2079
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079
Reference: CONFIRM:http://bugs.mysql.com/bug.php?id=32167
Reference: CONFIRM:http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html
Reference: CONFIRM:http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html
Reference: CONFIRM:http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html
Reference: CONFIRM:http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html

MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24,
and 6.0.x before 6.0.5 allows local users to bypass certain privilege
checks by calling CREATE TABLE on a MyISAM table with modified (1)
DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the
MySQL home data directory, which can point to tables that are created
in the future.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.