First published: Mon Aug 19 2013(Updated: )
Race condition in the post-installation script (mysql-server-5.5.postinst) for MySQL Server 5.5 for Debian GNU/Linux and Ubuntu Linux creates a configuration file with world-readable permissions before restricting the permissions, which allows local users to read the file and obtain sensitive information such as credentials.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2162 is classified as a medium severity vulnerability due to the potential for local users to read sensitive information.
To fix CVE-2013-2162, apply the recommended updates or patches for MySQL Server 5.5 on affected versions of Debian GNU/Linux and Ubuntu Linux.
CVE-2013-2162 affects users of MySQL Server 5.5 on Debian GNU/Linux and specific versions of Ubuntu Linux.
CVE-2013-2162 enables local users to access sensitive configuration files due to improper file permissions during installation.
CVE-2013-2162 is found in MySQL Server 5.5 for Debian GNU/Linux and specific Ubuntu Linux LTS versions up to 13.04.