CVE-2016-6664

mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.
References
Link Resource
http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html Exploit Third Party Advisory
http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2016-2130.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2749.html Third Party Advisory
http://seclists.org/fulldisclosure/2016/Nov/4 Mailing List Third Party Advisory
http://www.debian.org/security/2017/dsa-3770 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/539695/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/93612 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2192 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0279 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0574 Third Party Advisory
https://security.gentoo.org/glsa/201702-18 Third Party Advisory
https://www.exploit-db.com/exploits/40679/ Exploit Third Party Advisory VDB Entry
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ Vendor Advisory
http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html Exploit Third Party Advisory
http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2016-2130.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2749.html Third Party Advisory
http://seclists.org/fulldisclosure/2016/Nov/4 Mailing List Third Party Advisory
http://www.debian.org/security/2017/dsa-3770 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/539695/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/93612 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2192 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0279 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0574 Third Party Advisory
https://security.gentoo.org/glsa/201702-18 Third Party Advisory
https://www.exploit-db.com/exploits/40679/ Exploit Third Party Advisory VDB Entry
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:percona:xtradb_cluster:*:*:*:*:*:*:*:*
cpe:2.3:a:percona:xtradb_cluster:*:*:*:*:*:*:*:*
cpe:2.3:a:percona:xtradb_cluster:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:56

Type Values Removed Values Added
References () http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html - Exploit, Third Party Advisory () http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html - Exploit, Third Party Advisory
References () http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
References () http://rhn.redhat.com/errata/RHSA-2016-2130.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2130.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2016-2749.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2749.html - Third Party Advisory
References () http://seclists.org/fulldisclosure/2016/Nov/4 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2016/Nov/4 - Mailing List, Third Party Advisory
References () http://www.debian.org/security/2017/dsa-3770 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3770 - Third Party Advisory
References () http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/539695/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/539695/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/93612 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/93612 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:2192 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2192 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0279 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0279 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0574 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0574 - Third Party Advisory
References () https://security.gentoo.org/glsa/201702-18 - Third Party Advisory () https://security.gentoo.org/glsa/201702-18 - Third Party Advisory
References () https://www.exploit-db.com/exploits/40679/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/40679/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ - Vendor Advisory () https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ - Vendor Advisory

Information

Published : 2016-12-13 21:59

Updated : 2024-11-21 02:56


NVD link : CVE-2016-6664

Mitre link : CVE-2016-6664

CVE.ORG link : CVE-2016-6664


JSON object : View

Products Affected

mariadb

  • mariadb

percona

  • percona_server
  • xtradb_cluster

oracle

  • mysql
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')