MySQL 5.0.51a allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are associated with symlinks within pathnames for subdirectories of the MySQL home data directory, which are followed when tables are created in the future. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-2079.
References
Link | Resource |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html | Third Party Advisory |
http://secunia.com/advisories/32759 | Vendor Advisory |
http://secunia.com/advisories/32769 | Broken Link Not Applicable |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:094 | Broken Link |
http://www.openwall.com/lists/oss-security/2008/09/09/20 | Mailing List |
http://www.openwall.com/lists/oss-security/2008/09/16/3 | Mailing List |
http://www.ubuntu.com/usn/USN-671-1 | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45648 | VDB Entry |
Configurations
History
No history.
Information
Published : 2008-09-18 15:04
Updated : 2020-02-18 19:22
NVD link : CVE-2008-4097
Mitre link : CVE-2008-4097
CVE.ORG link : CVE-2008-4097
JSON object : View
Products Affected
oracle
- mysql
CWE
CWE-264
Permissions, Privileges, and Access Controls