blob: 34f11caeca50ae8f2c5a60698e730a61500983f5 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
|
#use wml::debian::translation-check translation="1.1" maintainer=""
#pddp arteek
<define-tag description>insecure temporary file creation</define-tag>
<define-tag moreinfo>
<p>Two vulnerabilities have been discovered in mysql, a common database
system. Two scripts contained in the package don't create temporary
files in a secure fashion. This could allow a local attacker to
overwrite files with the privileges of the user invoking the MySQL
server, which is often the root user. The Common Vulnerabilities and
Exposures identifies the following problems:</p>
<ul>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0381">CAN-2004-0381</a>
<p>The script mysqlbug in MySQL allows local users to overwrite
arbitrary files via a symlink attack.</p>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0388">CAN-2004-0388</a>
<p>The script mysqld_multi in MySQL allows local users to overwrite
arbitrary files via a symlink attack.</p>
</ul>
<p>For the stable distribution (woody) these problems have been fixed in
version 3.23.49-8.6.</p>
<p>For the unstable distribution (sid) these problems will be fixed in
version 4.0.18-6 of mysql-dfsg.</p>
<p>We recommend that you upgrade your mysql, mysql-dfsg and related
packages.</p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/security/2004/dsa-483.data"
|