2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2007-5969" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2007-12-10T19:46:00.000" ,
2024-11-22 07:15:30 +00:00
"lastModified" : "2024-11-21T00:39:04.037" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file."
} ,
{
"lang" : "es" ,
"value" : "MySQL Community Server versiones 5.0.x anteriores a 5.0.51, Enterprise Server versiones 5.0.x anteriores a 5.0.52, Server versiones 5.1.x anteriores a 5.1.23 y Server versiones 6.0.x anteriores a 6.0.4, cuando una tabla se basa en symlinks creados por medio de las opciones expl\u00edcitas DATA DIRECTORY e INDEX DIRECTORY, permite a los usuarios remotos autenticados sobrescribir la informaci\u00f3n de la tabla del sistema y alcanzar privilegios por medio de una sentencia RENAME TABLE que cambia el symlink para que apunte hacia un archivo existente."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:H/Au:S/C:C/I:C/A:C" ,
2024-11-22 07:15:30 +00:00
"baseScore" : 7.1 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "HIGH" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-22 07:15:30 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql_server:5.1.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB22F327-7795-4B25-B40E-5684F2A5B0BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql_server:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0714FFD1-72F8-40DA-8BD9-80A160B4EBE3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql_server:6.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5B02C419-7843-4400-9223-B9632A183FCE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql_server:6.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A9FF4637-F6CF-40FD-AE36-EA8B9C1ECBB6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql_server:6.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4DF9852D-A35F-49A8-9886-49991DD864F2"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:community_server:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "5.0.50" ,
"matchCriteriaId" : "8ED15232-83F0-4A63-8E8B-79B0C2BF80F9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:community_server:5.0.41:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5FAA5C79-6D2D-45BF-A392-0EA4F9D3C727"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:community_server:5.0.44:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9E670333-0E50-42D5-8D67-B1F565FFD59A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:community_server:5.0.45:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C576BBB-9A3B-4BDD-A362-00F65627284A"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql_enterprise_server:5.0.50:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7C003A85-4802-4B55-A7EA-5229A0FDEDB3"
}
]
}
]
}
] ,
"references" : [
2023-11-07 21:03:21 +00:00
{
"url" : "http://bugs.mysql.com/32111" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" ,
"source" : "cve@mitre.org"
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "http://forums.mysql.com/read.php?3%2C186931%2C186931" ,
2023-04-24 12:24:31 +02:00
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.mysql.com/announce/495" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" ,
"source" : "cve@mitre.org"
} ,
2023-11-07 21:03:21 +00:00
{
"url" : "http://secunia.com/advisories/27981" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28025" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28040" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28063" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28099" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28108" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28128" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28343" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28559" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28838" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/29706" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/32222" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://security.gentoo.org/glsa/glsa-200804-04.xml" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://support.apple.com/kb/HT3216" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.debian.org/security/2008/dsa-1451" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1155.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1157.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/486477/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/26765" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/31681" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securitytracker.com/id?1019060" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/4142" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/4198" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/0560/references" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/1000/references" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/2780" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://issues.rpath.com/browse/RPL-1999" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10509" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://usn.ubuntu.com/559-1/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" ,
"source" : "cve@mitre.org"
2024-11-22 07:15:30 +00:00
} ,
{
"url" : "http://bugs.mysql.com/32111" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://forums.mysql.com/read.php?3%2C186931%2C186931" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.mysql.com/announce/495" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/27981" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28025" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28040" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28063" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28099" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28108" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28128" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28343" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28559" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/28838" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/29706" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/32222" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://security.gentoo.org/glsa/glsa-200804-04.xml" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://support.apple.com/kb/HT3216" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.debian.org/security/2008/dsa-1451" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1155.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1157.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/486477/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/26765" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/31681" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securitytracker.com/id?1019060" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/4142" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/4198" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/0560/references" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/1000/references" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/2780" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://issues.rpath.com/browse/RPL-1999" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10509" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://usn.ubuntu.com/559-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}