CVE-2008-4098

MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25 Issue Tracking Third Party Advisory
http://bugs.mysql.com/bug.php?id=32167 Issue Tracking Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html Third Party Advisory
http://secunia.com/advisories/32578 Not Applicable
http://secunia.com/advisories/32759 Not Applicable
http://secunia.com/advisories/32769 Not Applicable
http://secunia.com/advisories/38517 Not Applicable
http://ubuntu.com/usn/usn-897-1 Third Party Advisory
http://www.debian.org/security/2008/dsa-1662 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:094 Broken Link
http://www.openwall.com/lists/oss-security/2008/09/09/20 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2008/09/16/3 Mailing List Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1067.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0110.html Third Party Advisory
http://www.ubuntu.com/usn/USN-1397-1
http://www.ubuntu.com/usn/USN-671-1 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/45649
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25 Issue Tracking Third Party Advisory
http://bugs.mysql.com/bug.php?id=32167 Issue Tracking Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html Third Party Advisory
http://secunia.com/advisories/32578 Not Applicable
http://secunia.com/advisories/32759 Not Applicable
http://secunia.com/advisories/32769 Not Applicable
http://secunia.com/advisories/38517 Not Applicable
http://ubuntu.com/usn/usn-897-1 Third Party Advisory
http://www.debian.org/security/2008/dsa-1662 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:094 Broken Link
http://www.openwall.com/lists/oss-security/2008/09/09/20 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2008/09/16/3 Mailing List Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1067.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0110.html Third Party Advisory
http://www.ubuntu.com/usn/USN-1397-1
http://www.ubuntu.com/usn/USN-671-1 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/45649
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*

History

21 Nov 2024, 00:50

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25 - Issue Tracking, Third Party Advisory () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25 - Issue Tracking, Third Party Advisory
References () http://bugs.mysql.com/bug.php?id=32167 - Patch, Issue Tracking, Vendor Advisory () http://bugs.mysql.com/bug.php?id=32167 - Issue Tracking, Patch, Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html - Third Party Advisory
References () http://secunia.com/advisories/32578 - Not Applicable () http://secunia.com/advisories/32578 - Not Applicable
References () http://secunia.com/advisories/32759 - Not Applicable () http://secunia.com/advisories/32759 - Not Applicable
References () http://secunia.com/advisories/32769 - Not Applicable () http://secunia.com/advisories/32769 - Not Applicable
References () http://secunia.com/advisories/38517 - Not Applicable () http://secunia.com/advisories/38517 - Not Applicable
References () http://ubuntu.com/usn/usn-897-1 - Third Party Advisory () http://ubuntu.com/usn/usn-897-1 - Third Party Advisory
References () http://www.debian.org/security/2008/dsa-1662 - Third Party Advisory () http://www.debian.org/security/2008/dsa-1662 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:094 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2009:094 - Broken Link
References () http://www.openwall.com/lists/oss-security/2008/09/09/20 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2008/09/09/20 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2008/09/16/3 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2008/09/16/3 - Mailing List, Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2009-1067.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2009-1067.html - Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2010-0110.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2010-0110.html - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-1397-1 - () http://www.ubuntu.com/usn/USN-1397-1 -
References () http://www.ubuntu.com/usn/USN-671-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-671-1 - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/45649 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/45649 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591 -

Information

Published : 2008-09-18 15:04

Updated : 2024-11-21 00:50


NVD link : CVE-2008-4098

Mitre link : CVE-2008-4098

CVE.ORG link : CVE-2008-4098


JSON object : View

Products Affected

canonical

  • ubuntu_linux

mysql

  • mysql

debian

  • debian_linux

oracle

  • mysql
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')