Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2007.0687 -- [RedHat] Important: mysql security update 11 September 2007 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: MySQL 5.0.x Publisher: Red Hat Operating System: Red Hat Application Stack v1.1 and prior Impact: Increased Privileges Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2007-3782 CVE-2007-3781 CVE-2007-3780 CVE-2007-2692 CVE-2007-2691 Ref: ESB-2007.0527 ESB-2007.0662 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2007-0894.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: mysql security update Advisory ID: RHSA-2007:0894-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0894.html Issue date: 2007-09-10 Updated on: 2007-09-10 Product: Red Hat Application Stack CVE Names: CVE-2007-2691 CVE-2007-2692 CVE-2007-3780 CVE-2007-3781 CVE-2007-3782 - - --------------------------------------------------------------------- 1. Summary: Updated MySQL packages for the Red Hat Application Stack comprising the v1.2 release fixed various security issues. The security issues in this errata are rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Application Stack v1 for Enterprise Linux AS (v.4) - i386, x86_64 Red Hat Application Stack v1 for Enterprise Linux ES (v.4) - i386, x86_64 3. Problem description: On the 23rd August 2007, Red Hat Application Stack v1.2 was released. This release contained a new version of MySQL that corrected several security issues found in the MySQL packages of Red Hat Application Stack v1.1. Users who have already updated to Red Hat Application Stack v1.2 will already have the new MySQL packages and are not affected by these issues. A flaw was discovered in MySQL's authentication protocol. A remote unauthenticated attacker could send a specially crafted authentication request to the MySQL server causing it to crash. (CVE-2007-3780) MySQL did not require privileges such as SELECT for the source table in a CREATE TABLE LIKE statement. A remote authenticated user could obtain sensitive information such as the table structure. (CVE-2007-3781) A flaw was discovered in MySQL that allowed remote authenticated users to gain update privileges for a table in another database via a view that refers to the external table (CVE-2007-3782). A flaw was discovered in the mysql_change_db function when returning from SQL SECURITY INVOKER stored routines. A remote authenticated user could use this flaw to gain database privileges. (CVE-2007-2692) MySQL did not require the DROP privilege for RENAME TABLE statements. A remote authenticated users could use this flaw to rename arbitrary tables. (CVE-2007-2691) 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 241688 - CVE-2007-2691 DROP privilege is not enforced when renaming tables 241689 - CVE-2007-2692 SECURITY INVOKER functions do not drop privilegies 248553 - CVE-2007-3781 CVE-2007-3782 New release of MySQL fixes security bugs 254108 - CVE-2007-3780 mysql malformed password crasher 6. RPMs required: Red Hat Application Stack v1 for Enterprise Linux AS (v.4): SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/RHWAS/SRPMS/mysql-5.0.44-1.el4s1.1.src.rpm 9cbddb080cbaf79a86796a51b2a157b6 mysql-5.0.44-1.el4s1.1.src.rpm i386: c37e8a5e4354a32cec55905395d9252e mysql-5.0.44-1.el4s1.1.i386.rpm 24e9b72f764bd9bd8de3752155e5ccf1 mysql-bench-5.0.44-1.el4s1.1.i386.rpm 1649ae3a0a993107a5378399b1f51212 mysql-cluster-5.0.44-1.el4s1.1.i386.rpm 05a43757a09fe957e28b8076a3593524 mysql-debuginfo-5.0.44-1.el4s1.1.i386.rpm 557c5a41c93cff87c59579bb36cb4d02 mysql-devel-5.0.44-1.el4s1.1.i386.rpm e157cc468767d85e2bd437577fa0a1ea mysql-libs-5.0.44-1.el4s1.1.i386.rpm a46bf4a951111094871dcd67d3b160c6 mysql-server-5.0.44-1.el4s1.1.i386.rpm 2445d7641bae80e115a9d3a6f7bbdadc mysql-test-5.0.44-1.el4s1.1.i386.rpm x86_64: c37e8a5e4354a32cec55905395d9252e mysql-5.0.44-1.el4s1.1.i386.rpm d03ec02590a6ce1d1090a1f8d12cc970 mysql-5.0.44-1.el4s1.1.x86_64.rpm a70972fdc4d3020059c58b9bf24224de mysql-bench-5.0.44-1.el4s1.1.x86_64.rpm 7296fe8d2b7657867df7c48f7eff9164 mysql-cluster-5.0.44-1.el4s1.1.x86_64.rpm 05a43757a09fe957e28b8076a3593524 mysql-debuginfo-5.0.44-1.el4s1.1.i386.rpm f009fe4a349d14b4c9f4c4cbe5e6f5aa mysql-debuginfo-5.0.44-1.el4s1.1.x86_64.rpm 66dd9230aaa7b36e2a3fb3cc08271d54 mysql-devel-5.0.44-1.el4s1.1.x86_64.rpm e157cc468767d85e2bd437577fa0a1ea mysql-libs-5.0.44-1.el4s1.1.i386.rpm 0a908c5f3cad66ebd72e9722f11c9216 mysql-libs-5.0.44-1.el4s1.1.x86_64.rpm 193a45c2fbc3153b462a5ca6f7aeafc7 mysql-server-5.0.44-1.el4s1.1.x86_64.rpm 7c23107ea5f1da91f8b6fc730933e1fc mysql-test-5.0.44-1.el4s1.1.x86_64.rpm Red Hat Application Stack v1 for Enterprise Linux ES (v.4): SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/RHWAS/SRPMS/mysql-5.0.44-1.el4s1.1.src.rpm 9cbddb080cbaf79a86796a51b2a157b6 mysql-5.0.44-1.el4s1.1.src.rpm i386: c37e8a5e4354a32cec55905395d9252e mysql-5.0.44-1.el4s1.1.i386.rpm 24e9b72f764bd9bd8de3752155e5ccf1 mysql-bench-5.0.44-1.el4s1.1.i386.rpm 1649ae3a0a993107a5378399b1f51212 mysql-cluster-5.0.44-1.el4s1.1.i386.rpm 05a43757a09fe957e28b8076a3593524 mysql-debuginfo-5.0.44-1.el4s1.1.i386.rpm 557c5a41c93cff87c59579bb36cb4d02 mysql-devel-5.0.44-1.el4s1.1.i386.rpm e157cc468767d85e2bd437577fa0a1ea mysql-libs-5.0.44-1.el4s1.1.i386.rpm a46bf4a951111094871dcd67d3b160c6 mysql-server-5.0.44-1.el4s1.1.i386.rpm 2445d7641bae80e115a9d3a6f7bbdadc mysql-test-5.0.44-1.el4s1.1.i386.rpm x86_64: c37e8a5e4354a32cec55905395d9252e mysql-5.0.44-1.el4s1.1.i386.rpm d03ec02590a6ce1d1090a1f8d12cc970 mysql-5.0.44-1.el4s1.1.x86_64.rpm a70972fdc4d3020059c58b9bf24224de mysql-bench-5.0.44-1.el4s1.1.x86_64.rpm 7296fe8d2b7657867df7c48f7eff9164 mysql-cluster-5.0.44-1.el4s1.1.x86_64.rpm 05a43757a09fe957e28b8076a3593524 mysql-debuginfo-5.0.44-1.el4s1.1.i386.rpm f009fe4a349d14b4c9f4c4cbe5e6f5aa mysql-debuginfo-5.0.44-1.el4s1.1.x86_64.rpm 66dd9230aaa7b36e2a3fb3cc08271d54 mysql-devel-5.0.44-1.el4s1.1.x86_64.rpm e157cc468767d85e2bd437577fa0a1ea mysql-libs-5.0.44-1.el4s1.1.i386.rpm 0a908c5f3cad66ebd72e9722f11c9216 mysql-libs-5.0.44-1.el4s1.1.x86_64.rpm 193a45c2fbc3153b462a5ca6f7aeafc7 mysql-server-5.0.44-1.el4s1.1.x86_64.rpm 7c23107ea5f1da91f8b6fc730933e1fc mysql-test-5.0.44-1.el4s1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3780 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3781 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3782 https://rhn.redhat.com/errata/RHEA-2007-0842.html http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2007 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFG5WWLXlSAg2UNWIIRAgmOAKC1k363IyQNJKdCye0StOh63psbQwCgtZEK xP6CvdzWaSPxXSZkOU/fxQQ= =c7tE - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRuYOvSh9+71yA2DNAQL0ZwQAkktPqZd1v8nv8Y0ljDR/0xYJFhYiUQ44 ppk9GL/BG7S0X5dsGDb17gruNcFgWI2BJRnW2CZFBwnRNZ9xmZLq3a4tKspEBDfq Vum2UpETNqgONi9r25e/zag9QrJ9PFb1RYeRzFrcdOyf1WJJsfRzEsGn6lRBMYSW XnQfZsn5o0I= =4r61 -----END PGP SIGNATURE-----