MySQL 5.0.51a allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are associated with symlinks within pathnames for subdirectories of the MySQL home data directory, which are followed when tables are created in the future. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-2079.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2009:094 | vendor advisory broken link |
http://www.ubuntu.com/usn/USN-671-1 | third party advisory vendor advisory |
http://secunia.com/advisories/32769 | not applicable third party advisory broken link |
http://www.openwall.com/lists/oss-security/2008/09/09/20 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45648 | vdb entry |
http://www.openwall.com/lists/oss-security/2008/09/16/3 | mailing list |
http://secunia.com/advisories/32759 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html | third party advisory vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25 | third party advisory |