First published: Thu Jul 03 2008(Updated: )
MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <0:4.1.22-2.el4_8.3 | 0:4.1.22-2.el4_8.3 |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Ubuntu Linux | =9.04 | |
Ubuntu Linux | =9.10 | |
Debian Debian Linux | =5.0 | |
MySQL Server | =5.0.0 | |
MySQL Server | =5.0.1 | |
MySQL Server | =5.0.2 | |
MySQL Server | =5.0.3 | |
MySQL Server | =5.0.4 | |
MySQL Server | =5.0.5 | |
MySQL Server | =5.0.10 | |
MySQL Server | =5.0.15 | |
MySQL Server | =5.0.16 | |
MySQL Server | =5.0.17 | |
MySQL Server | =5.0.20 | |
MySQL Server | =5.0.24 | |
MySQL Server | =5.0.30 | |
MySQL Server | =5.0.36 | |
MySQL Server | =5.0.44 | |
MySQL Server | =5.0.54 | |
MySQL Server | =5.0.56 | |
MySQL Server | =5.0.60 | |
MySQL Server | =5.0.66 | |
MySQL | =5.0.23 | |
MySQL | =5.0.25 | |
MySQL | =5.0.26 | |
MySQL | =5.0.28 | |
MySQL | =5.0.30-sp1 | |
MySQL | =5.0.32 | |
MySQL | =5.0.34 | |
MySQL | =5.0.36-sp1 | |
MySQL | =5.0.38 | |
MySQL | =5.0.40 | |
MySQL | =5.0.41 | |
MySQL | =5.0.42 | |
MySQL | =5.0.44-sp1 | |
MySQL | =5.0.45 | |
MySQL | =5.0.46 | |
MySQL | =5.0.48 | |
MySQL | =5.0.50 | |
MySQL | =5.0.50-sp1 | |
MySQL | =5.0.51 | |
MySQL | =5.0.52 | |
MySQL | =5.0.56-sp1 | |
MySQL | =5.0.58 | |
MySQL | =5.0.60-sp1 | |
MySQL | =5.0.62 | |
MySQL | =5.0.64 | |
MySQL | =5.0.66-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4098 has been classified as a moderate severity vulnerability.
To mitigate CVE-2008-4098, it is recommended to upgrade MySQL to version 5.0.67 or later.
CVE-2008-4098 affects MySQL versions before 5.0.67 and specific distributions of Linux including Red Hat and Ubuntu.
No, CVE-2008-4098 can only be exploited by local users on the affected system.
CVE-2008-4098 allows local users to bypass certain privilege checks, potentially leading to unauthorized access to data.