mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
209 lines
7.3 KiB
JSON
209 lines
7.3 KiB
JSON
{
|
|
"id": "CVE-2007-5970",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-12-10T19:46:00.000",
|
|
"lastModified": "2024-11-21T00:39:04.233",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "MySQL 5.1.x before 5.1.23 and 6.0.x before 6.0.4 allows remote authenticated users to gain privileges on arbitrary tables via unspecified vectors involving use of table-level DATA DIRECTORY and INDEX DIRECTORY options when creating a partitioned table with the same name as a table on which the user lacks privileges."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "MySQL 5.1.x versiones anteriores a 5.1.23, y 6.0.x versiones anteriores a 6.0.4, permite a usuarios remotos autenticados obtener privilegios en tablas de su elecci\u00f3n mediante vectores no especificados involucrando el uso a nivel de tabla de opciones DATA DIRECTORY e INDEX DIRECTORY cuando se crea una tabla particionada con el mismo nombre que una tabla en la que el usuario no tiene privilegios."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
|
"baseScore": 5.8,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F48E7355-2D9A-454D-AE66-B0AE015E31A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E51BF67A-BAEC-48F8-9290-67C6C5B8442E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1F5C6A2F-DEAE-470D-8888-0E9076CCA0B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C09231E-8759-4DFB-AA8D-17A1C6D43AC1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:6.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "81592813-78D9-4366-AD2E-94677D93F599"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://bugs.mysql.com/bug.php?id=32091",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/42607",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1019084",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/0560/references",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38988",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://bugs.mysql.com/bug.php?id=32091",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/42607",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1019084",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/0560/references",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38988",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
],
|
|
"vendorComments": [
|
|
{
|
|
"organization": "Red Hat",
|
|
"comment": "Not vulnerable. This issue did not affect the mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3, 4, 5, Red Hat Application Stack v1, and v2, as the versions shipped do not support table partitioning. The partitioning feature was introduced in development MySQL version 5.1.",
|
|
"lastModified": "2008-01-09T00:00:00"
|
|
}
|
|
]
|
|
} |