RHSA-2004_597

Vulnerability from csaf_redhat - Published: 2004-10-20 19:16 - Updated: 2024-11-21 23:15
Summary
Red Hat Security Advisory: mysql security update
Severity
Important
Notes
Topic: Updated mysql packages that fix various security issues, as well as a number of bugs, are now available for Red Hat Enterprise Linux 2.1.
Details: MySQL is a multi-user, multi-threaded SQL database server. A number security issues that affect the mysql server have been reported: Oleksandr Byelkin discovered that "ALTER TABLE ... RENAME" checked the CREATE/INSERT rights of the old table instead of the new one. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0835 to this issue. Lukasz Wojtow discovered a buffer overrun in the mysql_real_connect function. In order to exploit this issue an attacker would need to force the use of a malicious DNS server (CAN-2004-0836). Dean Ellis discovered that multiple threads ALTERing the same (or different) MERGE tables to change the UNION could cause the server to crash or stall (CAN-2004-0837). Sergei Golubchik discovered that if a user is granted privileges to a database with a name containing an underscore ("_"), the user also gains the ability to grant privileges to other databases with similar names (CAN-2004-0957). Additionally, the following minor temporary file vulnerabilities were discovered: - Stan Bubroski and Shaun Colley found a temporary file vulnerability in the mysqlbug script (CAN-2004-0381). - A temporary file vulnerability was discovered in mysqld_multi (CAN-2004-0388). - Jeroen van Wolffelaar discovered an temporary file vulnerability in the mysqlhotcopy script when using the scp method (CAN-2004-0457). All users of mysql should upgrade to these updated packages, which resolve these issues and also include fixes for a number of small bugs.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.

Vendor Fix Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ https://access.redhat.com/errata/RHSA-2004:597

The mysqld_multi script in MySQL allows local users to overwrite arbitrary files via a symlink attack.

Vendor Fix Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ https://access.redhat.com/errata/RHSA-2004:597

The mysqlhotcopy script in mysql 4.0.20 and earlier, when using the scp method from the mysql-server package, allows local users to overwrite arbitrary files via a symlink attack on temporary files.

Vendor Fix Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ https://access.redhat.com/errata/RHSA-2004:597

MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.

Vendor Fix Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ https://access.redhat.com/errata/RHSA-2004:597

Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).

Vendor Fix Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ https://access.redhat.com/errata/RHSA-2004:597

MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.

Vendor Fix Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ https://access.redhat.com/errata/RHSA-2004:597

Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.

Vendor Fix Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ https://access.redhat.com/errata/RHSA-2004:597
References
https://access.redhat.com/errata/RHSA-2004:597 self
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=112693 external
https://bugzilla.redhat.com/show_bug.cgi?id=113960 external
https://bugzilla.redhat.com/show_bug.cgi?id=115165 external
https://bugzilla.redhat.com/show_bug.cgi?id=124352 external
https://bugzilla.redhat.com/show_bug.cgi?id=129409 external
https://bugzilla.redhat.com/show_bug.cgi?id=130348 external
https://bugzilla.redhat.com/show_bug.cgi?id=135372 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2004-0381 self
https://bugzilla.redhat.com/show_bug.cgi?id=1617187 external
https://www.cve.org/CVERecord?id=CVE-2004-0381 external
https://nvd.nist.gov/vuln/detail/CVE-2004-0381 external
https://access.redhat.com/security/cve/CVE-2004-0388 self
https://bugzilla.redhat.com/show_bug.cgi?id=1617190 external
https://www.cve.org/CVERecord?id=CVE-2004-0388 external
https://nvd.nist.gov/vuln/detail/CVE-2004-0388 external
https://access.redhat.com/security/cve/CVE-2004-0457 self
https://bugzilla.redhat.com/show_bug.cgi?id=1617209 external
https://www.cve.org/CVERecord?id=CVE-2004-0457 external
https://nvd.nist.gov/vuln/detail/CVE-2004-0457 external
https://access.redhat.com/security/cve/CVE-2004-0835 self
https://bugzilla.redhat.com/show_bug.cgi?id=1617308 external
https://www.cve.org/CVERecord?id=CVE-2004-0835 external
https://nvd.nist.gov/vuln/detail/CVE-2004-0835 external
https://access.redhat.com/security/cve/CVE-2004-0836 self
https://bugzilla.redhat.com/show_bug.cgi?id=1617309 external
https://www.cve.org/CVERecord?id=CVE-2004-0836 external
https://nvd.nist.gov/vuln/detail/CVE-2004-0836 external
https://access.redhat.com/security/cve/CVE-2004-0837 self
https://bugzilla.redhat.com/show_bug.cgi?id=1617310 external
https://www.cve.org/CVERecord?id=CVE-2004-0837 external
https://nvd.nist.gov/vuln/detail/CVE-2004-0837 external
https://access.redhat.com/security/cve/CVE-2004-0957 self
https://bugzilla.redhat.com/show_bug.cgi?id=1617330 external
https://www.cve.org/CVERecord?id=CVE-2004-0957 external
https://nvd.nist.gov/vuln/detail/CVE-2004-0957 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated mysql packages that fix various security issues, as well as a\nnumber of bugs, are now available for Red Hat Enterprise Linux 2.1.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "MySQL is a multi-user, multi-threaded SQL database server.\n\nA number security issues that affect the mysql server have been reported:  \n\nOleksandr Byelkin discovered that \"ALTER TABLE ... RENAME\" checked\nthe CREATE/INSERT rights of the old table instead of the new one.  The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2004-0835 to this issue.\n\nLukasz Wojtow discovered a buffer overrun in the mysql_real_connect\nfunction.  In order to exploit this issue an attacker would need to force\nthe use of a malicious DNS server (CAN-2004-0836).\n\nDean Ellis discovered that multiple threads ALTERing the same (or\ndifferent) MERGE tables to change the UNION could cause the server to crash\nor stall (CAN-2004-0837).\n\nSergei Golubchik discovered that if a user is granted privileges to a\ndatabase with a name containing an underscore (\"_\"), the user also gains\nthe ability to grant privileges to other databases with similar names\n(CAN-2004-0957).\n\nAdditionally, the following minor temporary file vulnerabilities were\ndiscovered:\n \n- Stan Bubroski and Shaun Colley found a temporary file vulnerability in \n  the mysqlbug script (CAN-2004-0381).\n- A temporary file vulnerability was discovered in mysqld_multi  \n  (CAN-2004-0388).\n- Jeroen van Wolffelaar discovered an temporary file vulnerability in the \n  mysqlhotcopy script when using the scp method (CAN-2004-0457).\n\nAll users of mysql should upgrade to these updated packages, which resolve\nthese issues and also include fixes for a number of small bugs.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2004:597",
        "url": "https://access.redhat.com/errata/RHSA-2004:597"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "112693",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=112693"
      },
      {
        "category": "external",
        "summary": "113960",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=113960"
      },
      {
        "category": "external",
        "summary": "115165",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=115165"
      },
      {
        "category": "external",
        "summary": "124352",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=124352"
      },
      {
        "category": "external",
        "summary": "129409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=129409"
      },
      {
        "category": "external",
        "summary": "130348",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130348"
      },
      {
        "category": "external",
        "summary": "135372",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=135372"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_597.json"
      }
    ],
    "title": "Red Hat Security Advisory: mysql security update",
    "tracking": {
      "current_release_date": "2024-11-21T23:15:37+00:00",
      "generator": {
        "date": "2024-11-21T23:15:37+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2004:597",
      "initial_release_date": "2004-10-20T19:16:00+00:00",
      "revision_history": [
        {
          "date": "2004-10-20T19:16:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2004-10-20T00:00:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-21T23:15:37+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
                "product": {
                  "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
                  "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Linux Advanced Workstation 2.1",
                "product": {
                  "name": "Red Hat Linux Advanced Workstation 2.1",
                  "product_id": "Red Hat Linux Advanced Workstation 2.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 2.1",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 2.1",
                  "product_id": "Red Hat Enterprise Linux ES version 2.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 2.1",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 2.1",
                  "product_id": "Red Hat Enterprise Linux WS version 2.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2004-0381",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617187"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
          "Red Hat Enterprise Linux ES version 2.1",
          "Red Hat Enterprise Linux WS version 2.1",
          "Red Hat Linux Advanced Workstation 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2004-0381"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617187",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617187"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0381",
          "url": "https://www.cve.org/CVERecord?id=CVE-2004-0381"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0381",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0381"
        }
      ],
      "release_date": "2004-03-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2004-10-20T19:16:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  Use Red Hat\nNetwork to download and update your packages.  To launch the Red Hat\nUpdate Agent, use the following command:\n\n    up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n    http://www.redhat.com/docs/manuals/enterprise/",
          "product_ids": [
            "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
            "Red Hat Enterprise Linux ES version 2.1",
            "Red Hat Enterprise Linux WS version 2.1",
            "Red Hat Linux Advanced Workstation 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2004:597"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2004-0388",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617190"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mysqld_multi script in MySQL allows local users to overwrite arbitrary files via a symlink attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
          "Red Hat Enterprise Linux ES version 2.1",
          "Red Hat Enterprise Linux WS version 2.1",
          "Red Hat Linux Advanced Workstation 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2004-0388"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617190",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617190"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0388",
          "url": "https://www.cve.org/CVERecord?id=CVE-2004-0388"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0388",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0388"
        }
      ],
      "release_date": "2004-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2004-10-20T19:16:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  Use Red Hat\nNetwork to download and update your packages.  To launch the Red Hat\nUpdate Agent, use the following command:\n\n    up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n    http://www.redhat.com/docs/manuals/enterprise/",
          "product_ids": [
            "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
            "Red Hat Enterprise Linux ES version 2.1",
            "Red Hat Enterprise Linux WS version 2.1",
            "Red Hat Linux Advanced Workstation 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2004:597"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2004-0457",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617209"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mysqlhotcopy script in mysql 4.0.20 and earlier, when using the scp method from the mysql-server package, allows local users to overwrite arbitrary files via a symlink attack on temporary files.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
          "Red Hat Enterprise Linux ES version 2.1",
          "Red Hat Enterprise Linux WS version 2.1",
          "Red Hat Linux Advanced Workstation 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2004-0457"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617209",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617209"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0457",
          "url": "https://www.cve.org/CVERecord?id=CVE-2004-0457"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0457",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0457"
        }
      ],
      "release_date": "2004-08-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2004-10-20T19:16:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  Use Red Hat\nNetwork to download and update your packages.  To launch the Red Hat\nUpdate Agent, use the following command:\n\n    up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n    http://www.redhat.com/docs/manuals/enterprise/",
          "product_ids": [
            "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
            "Red Hat Enterprise Linux ES version 2.1",
            "Red Hat Enterprise Linux WS version 2.1",
            "Red Hat Linux Advanced Workstation 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2004:597"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2004-0835",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617308"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
          "Red Hat Enterprise Linux ES version 2.1",
          "Red Hat Enterprise Linux WS version 2.1",
          "Red Hat Linux Advanced Workstation 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2004-0835"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617308",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617308"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0835",
          "url": "https://www.cve.org/CVERecord?id=CVE-2004-0835"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0835"
        }
      ],
      "release_date": "2004-03-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2004-10-20T19:16:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  Use Red Hat\nNetwork to download and update your packages.  To launch the Red Hat\nUpdate Agent, use the following command:\n\n    up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n    http://www.redhat.com/docs/manuals/enterprise/",
          "product_ids": [
            "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
            "Red Hat Enterprise Linux ES version 2.1",
            "Red Hat Enterprise Linux WS version 2.1",
            "Red Hat Linux Advanced Workstation 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2004:597"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2004-0836",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617309"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
          "Red Hat Enterprise Linux ES version 2.1",
          "Red Hat Enterprise Linux WS version 2.1",
          "Red Hat Linux Advanced Workstation 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2004-0836"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617309",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617309"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0836",
          "url": "https://www.cve.org/CVERecord?id=CVE-2004-0836"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0836"
        }
      ],
      "release_date": "2004-06-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2004-10-20T19:16:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  Use Red Hat\nNetwork to download and update your packages.  To launch the Red Hat\nUpdate Agent, use the following command:\n\n    up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n    http://www.redhat.com/docs/manuals/enterprise/",
          "product_ids": [
            "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
            "Red Hat Enterprise Linux ES version 2.1",
            "Red Hat Enterprise Linux WS version 2.1",
            "Red Hat Linux Advanced Workstation 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2004:597"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2004-0837",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
          "Red Hat Enterprise Linux ES version 2.1",
          "Red Hat Enterprise Linux WS version 2.1",
          "Red Hat Linux Advanced Workstation 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2004-0837"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0837",
          "url": "https://www.cve.org/CVERecord?id=CVE-2004-0837"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0837"
        }
      ],
      "release_date": "2004-01-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2004-10-20T19:16:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  Use Red Hat\nNetwork to download and update your packages.  To launch the Red Hat\nUpdate Agent, use the following command:\n\n    up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n    http://www.redhat.com/docs/manuals/enterprise/",
          "product_ids": [
            "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
            "Red Hat Enterprise Linux ES version 2.1",
            "Red Hat Enterprise Linux WS version 2.1",
            "Red Hat Linux Advanced Workstation 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2004:597"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2004-0957",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617330"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
          "Red Hat Enterprise Linux ES version 2.1",
          "Red Hat Enterprise Linux WS version 2.1",
          "Red Hat Linux Advanced Workstation 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2004-0957"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617330",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617330"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0957",
          "url": "https://www.cve.org/CVERecord?id=CVE-2004-0957"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0957"
        }
      ],
      "release_date": "2004-05-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2004-10-20T19:16:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  Use Red Hat\nNetwork to download and update your packages.  To launch the Red Hat\nUpdate Agent, use the following command:\n\n    up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n    http://www.redhat.com/docs/manuals/enterprise/",
          "product_ids": [
            "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
            "Red Hat Enterprise Linux ES version 2.1",
            "Red Hat Enterprise Linux WS version 2.1",
            "Red Hat Linux Advanced Workstation 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2004:597"
        }
      ],
      "title": "security flaw"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…