Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2005-0710
Description:MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_init function.
Test IDs: 1.3.6.1.4.1.25623.1.0.52158   1.3.6.1.4.1.25623.1.0.54358   1.3.6.1.4.1.25623.1.0.53750   1.3.6.1.4.1.25623.1.0.52008   1.3.6.1.4.1.25623.1.0.51935  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2005-0710
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
BugTraq ID: 12781
http://www.securityfocus.com/bid/12781
Bugtraq: 20050310 Mysql CREATE FUNCTION mysql.func table arbitrary library injection (Google Search)
http://marc.info/?l=bugtraq&m=111065974004648&w=2
Debian Security Information: DSA-707 (Google Search)
http://www.debian.org/security/2005/dsa-707
http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:060
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10180
RedHat Security Advisories: RHSA-2005:334
http://www.redhat.com/support/errata/RHSA-2005-334.html
RedHat Security Advisories: RHSA-2005:348
http://www.redhat.com/support/errata/RHSA-2005-348.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
SuSE Security Announcement: SUSE-SA:2005:019 (Google Search)
http://www.novell.com/linux/security/advisories/2005_19_mysql.html
http://www.trustix.org/errata/2005/0009/
https://usn.ubuntu.com/96-1/
http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.html
XForce ISS Database: mysql-udfinit-gain-access(19658)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19658




© 1998-2024 E-Soft Inc. All rights reserved.