Release Date: | 2008-05-05 |
MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079. MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
See more information about CVE-2008-2079 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.
Base Score: | 4.6 | Base Metrics: | AV:N/AC:H/Au:S/C:P/I:P/A:P |
Access Vector: | Network | Attack Complexity: | High |
Authentication: | Requires single instance | Confidentiality Impact: | Partial |
Integrity Impact: | Partial | Availability Impact: | Partial |
Platform | Errata | Release Date |
Oracle Enterprise Linux version 4 (mysql) | ELSA-2008-0768 | 2008-08-01 |
Oracle Linux version 5 (mysql) | ELSA-2009-1289 | 2009-09-08 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team