sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor advisory |
http://secunia.com/advisories/38517 | third party advisory |
http://www.vupen.com/english/advisories/2010/1107 | vdb entry |
http://ubuntu.com/usn/usn-897-1 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html | vendor advisory |
http://bugs.mysql.com/bug.php?id=39277 | exploit |
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html | vendor advisory |
http://support.apple.com/kb/HT4077 | |
http://marc.info/?l=oss-security&m=125908040022018&w=2 | mailing list |
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=543619 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:044 | vendor advisory |
http://www.securityfocus.com/bid/38043 | vdb entry |
http://lists.mysql.com/commits/59711 | mailing list exploit |