[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 565/03 - Red Hat Security Advisory



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 565/03 dated 10.10.03  Time: 10:15
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------


Title
=====

Red Hat Security Advisory RHSA-2003:281-01:Updated MySQL packages fix vulnerability

Detail
====== 

Frank Denis reported a bug in unpatched versions of MySQL prior to version
3.23.58. Passwords for MySQL users are stored in the Password field of the
user table. Under this bug, a Password field with a value greater than 16
characters can cause a buffer overflow.



                   Red Hat Security Advisory

Synopsis:          Updated MySQL packages fix vulnerability
Advisory ID:       RHSA-2003:281-01
Issue date:        2003-10-09
Updated on:        2003-10-09
Product:           Red Hat Linux
Keywords:          
Cross references:  
Obsoletes:         RHSA-2003:093
CVE Names:         CAN-2003-0780
- ---------------------------------------------------------------------

1. Topic:

Updated MySQL server packages fix a buffer overflow vulnerability.

2. Relevant releases/architectures:

Red Hat Linux 7.1 - i386
Red Hat Linux 7.1 for iSeries (64 bit) - ppc
Red Hat Linux 7.1 for pSeries (64 bit) - ppc
Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386
Red Hat Linux 9 - i386

3. Problem description:

MySQL is a multi-user, multi-threaded SQL database server.

Frank Denis reported a bug in unpatched versions of MySQL prior to version
3.23.58. Passwords for MySQL users are stored in the Password field of the
user table. Under this bug, a Password field with a value greater than 16
characters can cause a buffer overflow. It may be possible for an attacker
with the ability to modify the user table to exploit this buffer overflow
to execute arbitrary code as the MySQL user. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2003-0780 to
this issue.

Users of MySQL are advised to upgrade to these erratum packages containing
MySQL 3.23.58, which is not vulnerable to this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Please note that this update is available via Red Hat Network.  To use Red
Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. RPMs required:

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/mysql-3.23.58-2.71.src.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/mysql-3.23.58-2.71.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/mysql-server-3.23.58-2.71.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/mysql-devel-3.23.58-2.71.i386.rpm

Red Hat Linux 7.1 for iSeries (64 bit):

SRPMS:
ftp://updates.redhat.com/7.1/en/os/iSeries/SRPMS/mysql-3.23.58-2.71.src.rpm

ppc:
ftp://updates.redhat.com/7.1/en/os/iSeries/ppc/mysql-3.23.58-2.71.ppc.rpm
ftp://updates.redhat.com/7.1/en/os/iSeries/ppc/mysql-server-3.23.58-2.71.ppc.rpm
ftp://updates.redhat.com/7.1/en/os/iSeries/ppc/mysql-devel-3.23.58-2.71.ppc.rpm

Red Hat Linux 7.1 for pSeries (64 bit):

SRPMS:
ftp://updates.redhat.com/7.1/en/os/pSeries/SRPMS/mysql-3.23.58-2.71.src.rpm

ppc:
ftp://updates.redhat.com/7.1/en/os/pSeries/ppc/mysql-3.23.58-2.71.ppc.rpm
ftp://updates.redhat.com/7.1/en/os/pSeries/ppc/mysql-server-3.23.58-2.71.ppc.rpm
ftp://updates.redhat.com/7.1/en/os/pSeries/ppc/mysql-devel-3.23.58-2.71.ppc.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/mysql-3.23.58-1.72.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/mysql-3.23.58-1.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/mysql-server-3.23.58-1.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/mysql-devel-3.23.58-1.72.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/mysql-3.23.58-1.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/mysql-server-3.23.58-1.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/mysql-devel-3.23.58-1.72.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/mysql-3.23.58-1.73.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/mysql-3.23.58-1.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/mysql-server-3.23.58-1.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/mysql-devel-3.23.58-1.73.i386.rpm

Red Hat Linux 8.0:

SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/mysql-3.23.58-1.80.src.rpm

i386:
ftp://updates.redhat.com/8.0/en/os/i386/mysql-3.23.58-1.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/mysql-server-3.23.58-1.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/mysql-devel-3.23.58-1.80.i386.rpm

Red Hat Linux 9:

SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/mysql-3.23.58-1.9.src.rpm

i386:
ftp://updates.redhat.com/9/en/os/i386/mysql-3.23.58-1.9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/mysql-server-3.23.58-1.9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/mysql-devel-3.23.58-1.9.i386.rpm



6. Verification:

MD5 sum                          Package Name
- --------------------------------------------------------------------------
1af9dba0f82c30e3bd06a22ad3cce47f 7.1/en/os/SRPMS/mysql-3.23.58-2.71.src.rpm
cb8182bcfe17aa1829e0e62032e79d8c 7.1/en/os/i386/mysql-3.23.58-2.71.i386.rpm
7ce3f107817c4c32163c7b2b085317bf 7.1/en/os/i386/mysql-devel-3.23.58-2.71.i386.rpm
a63d0198da176c5e25738bebc7adf96b 7.1/en/os/i386/mysql-server-3.23.58-2.71.i386.rpm
1af9dba0f82c30e3bd06a22ad3cce47f 7.1/en/os/iSeries/SRPMS/mysql-3.23.58-2.71.src.rpm
892b2616bdc5efd5e37fd91e6d220fb8 7.1/en/os/iSeries/ppc/mysql-3.23.58-2.71.ppc.rpm
bd60781e5bbf60f87d027f6d6460c39f 7.1/en/os/iSeries/ppc/mysql-devel-3.23.58-2.71.ppc.rpm
846b26298bdf3e437954eed63757bf6e 7.1/en/os/iSeries/ppc/mysql-server-3.23.58-2.71.ppc.rpm
1af9dba0f82c30e3bd06a22ad3cce47f 7.1/en/os/pSeries/SRPMS/mysql-3.23.58-2.71.src.rpm
892b2616bdc5efd5e37fd91e6d220fb8 7.1/en/os/pSeries/ppc/mysql-3.23.58-2.71.ppc.rpm
bd60781e5bbf60f87d027f6d6460c39f 7.1/en/os/pSeries/ppc/mysql-devel-3.23.58-2.71.ppc.rpm
846b26298bdf3e437954eed63757bf6e 7.1/en/os/pSeries/ppc/mysql-server-3.23.58-2.71.ppc.rpm
ca6ec39d94f16bf21ae966d674e8ad15 7.2/en/os/SRPMS/mysql-3.23.58-1.72.src.rpm
fd4adfe080eee307a9a78daf49688dae 7.2/en/os/i386/mysql-3.23.58-1.72.i386.rpm
a1bb526948f3fafbff27f65f2f2646f4 7.2/en/os/i386/mysql-devel-3.23.58-1.72.i386.rpm
0ef086ea42e5daf662b238c4cd3941b4 7.2/en/os/i386/mysql-server-3.23.58-1.72.i386.rpm
592cbe1df440454be5de2bde4da0aeeb 7.2/en/os/ia64/mysql-3.23.58-1.72.ia64.rpm
fb82da0bd237e8e47757deea248966f6 7.2/en/os/ia64/mysql-devel-3.23.58-1.72.ia64.rpm
321d0908982321e779c93b8b933f4d89 7.2/en/os/ia64/mysql-server-3.23.58-1.72.ia64.rpm
a9e7a07bb76dd1320e0c395ce48231b1 7.3/en/os/SRPMS/mysql-3.23.58-1.73.src.rpm
03bdb421e367c398282ea54b6cc33bfb 7.3/en/os/i386/mysql-3.23.58-1.73.i386.rpm
ade8d6e100916f3bbfac27e88700179b 7.3/en/os/i386/mysql-devel-3.23.58-1.73.i386.rpm
e197723474c4dccdcb689d6208edd766 7.3/en/os/i386/mysql-server-3.23.58-1.73.i386.rpm
c5420710b963e4b402a5ce1b0af50f5a 8.0/en/os/SRPMS/mysql-3.23.58-1.80.src.rpm
d72af1bf81fb3cdd5f1696196122dd59 8.0/en/os/i386/mysql-3.23.58-1.80.i386.rpm
be0a150e64c0c68249b7dfb6f723d696 8.0/en/os/i386/mysql-devel-3.23.58-1.80.i386.rpm
7e9295efeca974cbadc61ee2a02f6d59 8.0/en/os/i386/mysql-server-3.23.58-1.80.i386.rpm
f3320713e2a1bc787e249738bec90c4d 9/en/os/SRPMS/mysql-3.23.58-1.9.src.rpm
aa674d9d284788f8c354f3f20b6aec57 9/en/os/i386/mysql-3.23.58-1.9.i386.rpm
8eac37417227bf2c0c7d13a2eafcb80f 9/en/os/i386/mysql-devel-3.23.58-1.9.i386.rpm
78b516147ff717a2db347260e85e6688 9/en/os/i386/mysql-server-3.23.58-1.9.i386.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available from https://www.redhat.com/security/keys.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum <filename>


7. References:

http://www.mysql.com/doc/en/News-3.23.58.html
http://www.mysql.com/doc/en/News-3.23.57.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0780

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.

*** END PGP VERIFIED MESSAGE ***



- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via EMail to:
uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of RedHat for the information
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBP4Z2Y4pao72zK539AQEiWQQAjKtmq2mbP+o4hKDAOWDhYfAgDyWnrf6c
zav640QHotVY6jljrVunG/133gGwIREltSh+e6eA5Pxb/LTji8QcRQ6h1yoHH5I3
zlQctkY0cSrfqe3t3ZLJgeVkGAlSFHajf4ksqlVkrM8HyqeLP2ToOFeXsFRTAgUM
8N4o6ZRKURE=
=kF4d
-----END PGP SIGNATURE-----