First published: Fri Jul 04 2008(Updated: )
Devin Carraway of the Debian Security Team discovered that the upstream fix for the <a href="https://access.redhat.com/security/cve/CVE-2008-2079">CVE-2008-2079</a> is incomplete and still makes it possible for local users to create tables via INDEX/DATA DIRECTORY directives in the MySQL data directory (/var/lib/mysql) via directory symlinks. <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25</a> <a href="https://access.redhat.com/security/cve/CVE-2008-2079">CVE-2008-2079</a> was tracked via bug <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2008-2079 mysql: privilege escalation via DATA/INDEX DIRECTORY directives" href="show_bug.cgi?id=445222">bug #445222</a>. An attacker needs following to exploit this issue: - MySQL database account with privileges to create tables - shell access to the host running MySQL database with write access to a directory accessible by the mysqld daemon process
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-454077 is considered high due to the potential for local users to exploit the vulnerability.
To fix REDHAT-BUG-454077, ensure that you apply the latest security patches for MySQL provided by your vendor.
REDHAT-BUG-454077 affects MySQL server installations where local users may create specific directory directives.
The vulnerability identified by REDHAT-BUG-454077 was discovered by Devin Carraway of the Debian Security Team.
The upstream fix for the issues related to REDHAT-BUG-454077 is incomplete, allowing for continued exploitation.