Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2006.0402 -- [RedHat] Important: mysql security update 13 June 2006 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: MySQL Publisher: Red Hat Operating System: Red Hat Enterprise Linux AS/ES/WS 4 Red Hat Enterprise Linux Desktop 4 Impact: Execute Arbitrary Code/Commands Inappropriate Access Access: Remote/Unauthenticated CVE Names: CVE-2006-2753 CVE-2006-1517 CVE-2006-1516 CVE-2006-0903 Ref: AL-2006.0033 AU-2006.0015 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2006-0544.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: mysql security update Advisory ID: RHSA-2006:0544-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0544.html Issue date: 2006-06-09 Updated on: 2006-06-09 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-0903 CVE-2006-1516 CVE-2006-1517 CVE-2006-2753 - - --------------------------------------------------------------------- 1. Summary: Updated mysql packages that fix multiple security flaws are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. A flaw was found in the way the MySQL mysql_real_escape() function escaped strings when operating in a multibyte character encoding. An attacker could provide an application a carefully crafted string containing invalidly-encoded characters which may be improperly escaped, leading to the injection of malicious SQL commands. (CVE-2006-2753) An information disclosure flaw was found in the way the MySQL server processed malformed usernames. An attacker could view a small portion of server memory by supplying an anonymous login username which was not null terminated. (CVE-2006-1516) An information disclosure flaw was found in the way the MySQL server executed the COM_TABLE_DUMP command. An authenticated malicious user could send a specially crafted packet to the MySQL server which returned random unallocated memory. (CVE-2006-1517) A log file obfuscation flaw was found in the way the mysql_real_query() function creates log file entries. An attacker with the the ability to call the mysql_real_query() function against a mysql server can obfuscate the entry the server will write to the log file. However, an attacker needed to have complete control over a server in order to attempt this attack. (CVE-2006-0903) This update also fixes numerous non-security-related flaws, such as intermittent authentication failures. All users of mysql are advised to upgrade to these updated packages containing MySQL version 4.1.20, which is not vulnerable to these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 183260 - CVE-2006-0903 Mysql log file obfuscation 183277 - Client error in mysql on updates when high concurrency 190743 - CVE-2006-1517 Mysql information leak 190863 - CVE-2006-1516 mysql anonymous login information leak 193827 - CVE-2006-2753 MySQL improper multibyte string escaping 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/mysql-4.1.20-1.RHEL4.1.src.rpm a2f3a2d4debf79880185121dbbe44046 mysql-4.1.20-1.RHEL4.1.src.rpm i386: 08a2cb1c1b6d0a017d1dd8b0e146d753 mysql-4.1.20-1.RHEL4.1.i386.rpm 4c64c56cf7cd7e51b8af1ddc0d7f9927 mysql-bench-4.1.20-1.RHEL4.1.i386.rpm 96ba397daa68548bb295892e42b09e33 mysql-debuginfo-4.1.20-1.RHEL4.1.i386.rpm c8b580d2a1a92a11a2f493dba2b96159 mysql-devel-4.1.20-1.RHEL4.1.i386.rpm 8aa0d5a1d3600ff7896d82d69935aed3 mysql-server-4.1.20-1.RHEL4.1.i386.rpm ia64: 08a2cb1c1b6d0a017d1dd8b0e146d753 mysql-4.1.20-1.RHEL4.1.i386.rpm 31f495c09ada1272043c2f20d51da60f mysql-4.1.20-1.RHEL4.1.ia64.rpm dd14f3e7d79bcb43249ac4ac8e1f0e94 mysql-bench-4.1.20-1.RHEL4.1.ia64.rpm 96ba397daa68548bb295892e42b09e33 mysql-debuginfo-4.1.20-1.RHEL4.1.i386.rpm e620639f885eaf3be8c6c1d40c1940de mysql-debuginfo-4.1.20-1.RHEL4.1.ia64.rpm 645a30fe7523fabb1dad211122c91696 mysql-devel-4.1.20-1.RHEL4.1.ia64.rpm 862dc1e3420a5701a6cfba70637b9fb0 mysql-server-4.1.20-1.RHEL4.1.ia64.rpm ppc: 73930f1ecacdf0104a5fa0eb26991af5 mysql-4.1.20-1.RHEL4.1.ppc.rpm fb6cd06215f42871c55040072bef98de mysql-4.1.20-1.RHEL4.1.ppc64.rpm 324850079285509d584b626966f89843 mysql-bench-4.1.20-1.RHEL4.1.ppc.rpm 0f80ce0a2b0891a0aab431d9c5588d42 mysql-debuginfo-4.1.20-1.RHEL4.1.ppc.rpm d26e8999933c2bc912a6527b787cc299 mysql-debuginfo-4.1.20-1.RHEL4.1.ppc64.rpm 217f143cc4e238fab9be84224e224635 mysql-devel-4.1.20-1.RHEL4.1.ppc.rpm 9030e10ce11abc622e8199a3b4556a98 mysql-server-4.1.20-1.RHEL4.1.ppc.rpm s390: ffcae0f612254941d5ad5456f0ac01ad mysql-4.1.20-1.RHEL4.1.s390.rpm 4e73c481e7694d273855f11008297075 mysql-bench-4.1.20-1.RHEL4.1.s390.rpm cd366cc29ed9e1a0ccbee71ff87e5885 mysql-debuginfo-4.1.20-1.RHEL4.1.s390.rpm 0c8cf2d8bbb3a612448715678ffdcd8d mysql-devel-4.1.20-1.RHEL4.1.s390.rpm dac602ffe37660b8e3c01ecfeb910337 mysql-server-4.1.20-1.RHEL4.1.s390.rpm s390x: ffcae0f612254941d5ad5456f0ac01ad mysql-4.1.20-1.RHEL4.1.s390.rpm 63bae1479ea4798b2d0baa5478819402 mysql-4.1.20-1.RHEL4.1.s390x.rpm 739d66b027e6ba5a7826e7b039bc7060 mysql-bench-4.1.20-1.RHEL4.1.s390x.rpm cd366cc29ed9e1a0ccbee71ff87e5885 mysql-debuginfo-4.1.20-1.RHEL4.1.s390.rpm cba045f8922ce1337e6bebca5de72d9c mysql-debuginfo-4.1.20-1.RHEL4.1.s390x.rpm 3463483049e38a6fbd4ee34f427ac869 mysql-devel-4.1.20-1.RHEL4.1.s390x.rpm 20870248905a1c3af1bf6b17688b5843 mysql-server-4.1.20-1.RHEL4.1.s390x.rpm x86_64: 08a2cb1c1b6d0a017d1dd8b0e146d753 mysql-4.1.20-1.RHEL4.1.i386.rpm 3c3d997209f94f16c296ec9022f0ae56 mysql-4.1.20-1.RHEL4.1.x86_64.rpm 9247f09ee8067fb2e233948399c2ee19 mysql-bench-4.1.20-1.RHEL4.1.x86_64.rpm 96ba397daa68548bb295892e42b09e33 mysql-debuginfo-4.1.20-1.RHEL4.1.i386.rpm 9b83df74fbedf9922bfea831c7442e00 mysql-debuginfo-4.1.20-1.RHEL4.1.x86_64.rpm 6dd062482cf41bf37c426dbb7d5d19f7 mysql-devel-4.1.20-1.RHEL4.1.x86_64.rpm 3dc3e127614cc1d015ec43d34e5f66dd mysql-server-4.1.20-1.RHEL4.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/mysql-4.1.20-1.RHEL4.1.src.rpm a2f3a2d4debf79880185121dbbe44046 mysql-4.1.20-1.RHEL4.1.src.rpm i386: 08a2cb1c1b6d0a017d1dd8b0e146d753 mysql-4.1.20-1.RHEL4.1.i386.rpm 4c64c56cf7cd7e51b8af1ddc0d7f9927 mysql-bench-4.1.20-1.RHEL4.1.i386.rpm 96ba397daa68548bb295892e42b09e33 mysql-debuginfo-4.1.20-1.RHEL4.1.i386.rpm c8b580d2a1a92a11a2f493dba2b96159 mysql-devel-4.1.20-1.RHEL4.1.i386.rpm 8aa0d5a1d3600ff7896d82d69935aed3 mysql-server-4.1.20-1.RHEL4.1.i386.rpm x86_64: 08a2cb1c1b6d0a017d1dd8b0e146d753 mysql-4.1.20-1.RHEL4.1.i386.rpm 3c3d997209f94f16c296ec9022f0ae56 mysql-4.1.20-1.RHEL4.1.x86_64.rpm 9247f09ee8067fb2e233948399c2ee19 mysql-bench-4.1.20-1.RHEL4.1.x86_64.rpm 96ba397daa68548bb295892e42b09e33 mysql-debuginfo-4.1.20-1.RHEL4.1.i386.rpm 9b83df74fbedf9922bfea831c7442e00 mysql-debuginfo-4.1.20-1.RHEL4.1.x86_64.rpm 6dd062482cf41bf37c426dbb7d5d19f7 mysql-devel-4.1.20-1.RHEL4.1.x86_64.rpm 3dc3e127614cc1d015ec43d34e5f66dd mysql-server-4.1.20-1.RHEL4.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/mysql-4.1.20-1.RHEL4.1.src.rpm a2f3a2d4debf79880185121dbbe44046 mysql-4.1.20-1.RHEL4.1.src.rpm i386: 08a2cb1c1b6d0a017d1dd8b0e146d753 mysql-4.1.20-1.RHEL4.1.i386.rpm 4c64c56cf7cd7e51b8af1ddc0d7f9927 mysql-bench-4.1.20-1.RHEL4.1.i386.rpm 96ba397daa68548bb295892e42b09e33 mysql-debuginfo-4.1.20-1.RHEL4.1.i386.rpm c8b580d2a1a92a11a2f493dba2b96159 mysql-devel-4.1.20-1.RHEL4.1.i386.rpm 8aa0d5a1d3600ff7896d82d69935aed3 mysql-server-4.1.20-1.RHEL4.1.i386.rpm ia64: 08a2cb1c1b6d0a017d1dd8b0e146d753 mysql-4.1.20-1.RHEL4.1.i386.rpm 31f495c09ada1272043c2f20d51da60f mysql-4.1.20-1.RHEL4.1.ia64.rpm dd14f3e7d79bcb43249ac4ac8e1f0e94 mysql-bench-4.1.20-1.RHEL4.1.ia64.rpm 96ba397daa68548bb295892e42b09e33 mysql-debuginfo-4.1.20-1.RHEL4.1.i386.rpm e620639f885eaf3be8c6c1d40c1940de mysql-debuginfo-4.1.20-1.RHEL4.1.ia64.rpm 645a30fe7523fabb1dad211122c91696 mysql-devel-4.1.20-1.RHEL4.1.ia64.rpm 862dc1e3420a5701a6cfba70637b9fb0 mysql-server-4.1.20-1.RHEL4.1.ia64.rpm x86_64: 08a2cb1c1b6d0a017d1dd8b0e146d753 mysql-4.1.20-1.RHEL4.1.i386.rpm 3c3d997209f94f16c296ec9022f0ae56 mysql-4.1.20-1.RHEL4.1.x86_64.rpm 9247f09ee8067fb2e233948399c2ee19 mysql-bench-4.1.20-1.RHEL4.1.x86_64.rpm 96ba397daa68548bb295892e42b09e33 mysql-debuginfo-4.1.20-1.RHEL4.1.i386.rpm 9b83df74fbedf9922bfea831c7442e00 mysql-debuginfo-4.1.20-1.RHEL4.1.x86_64.rpm 6dd062482cf41bf37c426dbb7d5d19f7 mysql-devel-4.1.20-1.RHEL4.1.x86_64.rpm 3dc3e127614cc1d015ec43d34e5f66dd mysql-server-4.1.20-1.RHEL4.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/mysql-4.1.20-1.RHEL4.1.src.rpm a2f3a2d4debf79880185121dbbe44046 mysql-4.1.20-1.RHEL4.1.src.rpm i386: 08a2cb1c1b6d0a017d1dd8b0e146d753 mysql-4.1.20-1.RHEL4.1.i386.rpm 4c64c56cf7cd7e51b8af1ddc0d7f9927 mysql-bench-4.1.20-1.RHEL4.1.i386.rpm 96ba397daa68548bb295892e42b09e33 mysql-debuginfo-4.1.20-1.RHEL4.1.i386.rpm c8b580d2a1a92a11a2f493dba2b96159 mysql-devel-4.1.20-1.RHEL4.1.i386.rpm 8aa0d5a1d3600ff7896d82d69935aed3 mysql-server-4.1.20-1.RHEL4.1.i386.rpm ia64: 08a2cb1c1b6d0a017d1dd8b0e146d753 mysql-4.1.20-1.RHEL4.1.i386.rpm 31f495c09ada1272043c2f20d51da60f mysql-4.1.20-1.RHEL4.1.ia64.rpm dd14f3e7d79bcb43249ac4ac8e1f0e94 mysql-bench-4.1.20-1.RHEL4.1.ia64.rpm 96ba397daa68548bb295892e42b09e33 mysql-debuginfo-4.1.20-1.RHEL4.1.i386.rpm e620639f885eaf3be8c6c1d40c1940de mysql-debuginfo-4.1.20-1.RHEL4.1.ia64.rpm 645a30fe7523fabb1dad211122c91696 mysql-devel-4.1.20-1.RHEL4.1.ia64.rpm 862dc1e3420a5701a6cfba70637b9fb0 mysql-server-4.1.20-1.RHEL4.1.ia64.rpm x86_64: 08a2cb1c1b6d0a017d1dd8b0e146d753 mysql-4.1.20-1.RHEL4.1.i386.rpm 3c3d997209f94f16c296ec9022f0ae56 mysql-4.1.20-1.RHEL4.1.x86_64.rpm 9247f09ee8067fb2e233948399c2ee19 mysql-bench-4.1.20-1.RHEL4.1.x86_64.rpm 96ba397daa68548bb295892e42b09e33 mysql-debuginfo-4.1.20-1.RHEL4.1.i386.rpm 9b83df74fbedf9922bfea831c7442e00 mysql-debuginfo-4.1.20-1.RHEL4.1.x86_64.rpm 6dd062482cf41bf37c426dbb7d5d19f7 mysql-devel-4.1.20-1.RHEL4.1.x86_64.rpm 3dc3e127614cc1d015ec43d34e5f66dd mysql-server-4.1.20-1.RHEL4.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0903 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2753 http://lists.mysql.com/announce/364 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFEiZIkXlSAg2UNWIIRAub7AJ9VTr8g04Mr7jMmGyFYzBD85hPp1gCfSxGv S69DIVl90FSFSdN2ogVTqnc= =Td5w - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRI4B3Sh9+71yA2DNAQKkiQP9HX4H2cDo6NlSYnfNm7nL0YOOMZ9YlJiH 7YUlT22MZVw3nf23fKmVV1WUHToK1n8/SvYCIAghOHTc22EdJ1exdogf3eeXYtqp uaRB/5Kk48gfs/8WVRSxGFDjhFtE5bnXNhirWcT2tDqNqmkwiE///s9pc1EJe7T1 BtUHcK747v0= =8ScP -----END PGP SIGNATURE-----