2024-12-08 03:06:42 +00:00

602 lines
20 KiB
JSON

{
"id": "CVE-2008-4098",
"sourceIdentifier": "secalert@redhat.com",
"published": "2008-09-18T15:04:27.407",
"lastModified": "2024-11-21T00:50:53.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097."
},
{
"lang": "es",
"value": "MySQL anterior a 5.0.67, permite a usuarios locales evitar determinadas comprobaciones de privilegios haciendo una llamada CREATE TABLE en una tabla MyISAM que modifica los argumentos (1) DATA DIRECTORY o (2) INDEX DIRECTORY que est\u00e1n asociados originalmente con los nombres de ruta (pathname) sin enlaces simb\u00f3licos, y que pueden apuntar a tablas creadas despu\u00e9s de que un nombre de ruta sea modificado para tener un enlace simb\u00f3lico a un subdirectorio del directorio de datos inicial de MySQL. NOTA: esta vulnerabilidad es debida a que no se solucion\u00f3 completamente la vulnerabilidad CVE-2008-4097."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
"baseScore": 4.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
"matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
"matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
"matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
"matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "FB92A552-079E-4A5E-B65E-8A6C956FC7DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
"matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5CD839-1C18-44F2-836F-97B85572D491"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*",
"matchCriteriaId": "4BA355E8-593E-470C-B565-60CD51B14C3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF30535-45D3-4845-8B7C-16F7B6D05F63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
"matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*",
"matchCriteriaId": "87BAAF59-A8F5-46AB-9CAC-E0F76B47D942"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
"matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*",
"matchCriteriaId": "60540719-8329-47E4-820F-8B4E4AA55AF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*",
"matchCriteriaId": "7147148B-BD26-4280-9B3F-1B27551E0CAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
"matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*",
"matchCriteriaId": "DC81D22D-72FE-4FEC-8277-A994B184B91C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
"matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
"matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*",
"matchCriteriaId": "B15A96B9-3982-49DF-A836-1DBC3FD29EF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*",
"matchCriteriaId": "A02DEBB1-65A5-4422-8B75-E8C86EA0B947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*",
"matchCriteriaId": "56225075-5A65-409E-AFC9-CACA381EAC29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB11E34-4045-4ACA-AD7D-48B70D13CD92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2FC440-4D06-4CE2-BE20-A46EB196182F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*",
"matchCriteriaId": "455E364E-5010-47D9-8F09-58FE4B15615B"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25",
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "http://bugs.mysql.com/bug.php?id=32167",
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/32578",
"source": "secalert@redhat.com",
"tags": [
"Not Applicable"
]
},
{
"url": "http://secunia.com/advisories/32759",
"source": "secalert@redhat.com",
"tags": [
"Not Applicable"
]
},
{
"url": "http://secunia.com/advisories/32769",
"source": "secalert@redhat.com",
"tags": [
"Not Applicable"
]
},
{
"url": "http://secunia.com/advisories/38517",
"source": "secalert@redhat.com",
"tags": [
"Not Applicable"
]
},
{
"url": "http://ubuntu.com/usn/usn-897-1",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1662",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2008/09/09/20",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2008/09/16/3",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.ubuntu.com/usn/USN-1397-1",
"source": "secalert@redhat.com"
},
{
"url": "http://www.ubuntu.com/usn/USN-671-1",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45649",
"source": "secalert@redhat.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591",
"source": "secalert@redhat.com"
},
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "http://bugs.mysql.com/bug.php?id=32167",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/32578",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "http://secunia.com/advisories/32759",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "http://secunia.com/advisories/32769",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "http://secunia.com/advisories/38517",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "http://ubuntu.com/usn/usn-897-1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1662",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2008/09/09/20",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2008/09/16/3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.ubuntu.com/usn/USN-1397-1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.ubuntu.com/usn/USN-671-1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45649",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "This issue was addressed in Red Hat Enterprise Linux 4 via https://rhn.redhat.com/errata/RHSA-2010-0110.html and in Red Hat Application Stack v2 via https://rhn.redhat.com/errata/RHSA-2009-1067.html .\n\nIn Red Hat Enterprise Linux 5, issue CVE-2008-2079 was fixed without introducing CVE-2008-4098 in https://rhn.redhat.com/errata/RHSA-2009-1289.html .",
"lastModified": "2010-02-17T00:00:00"
}
]
}