summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2006-05-05 22:24:36 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2006-05-05 22:24:36 +0000
commitfd0ae98d6ffaf5adb681f82a7cda69d45fe47d02 (patch)
treeb45793a14ef475cc7646c82c79a3d7465fd48d8a
parent- Cancel last rsync entry. Does not affect FreeBSD port. (diff)
- Add missing s in latest awstats entry's title.
- Document mysql50-server -- COM_TABLE_DUMP arbitrary code execution.
Notes
Notes: svn path=/head/; revision=161448
-rw-r--r--security/vuxml/vuln.xml37
1 files changed, 36 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 909c6d6827b8..1af2982654bb 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,8 +34,43 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="a8d8713e-dc83-11da-a22b-000c6ec775d9">
+ <topic>mysql50-server -- COM_TABLE_DUMP arbitrary code execution</topic>
+ <affects>
+ <package>
+ <name>mysql-server</name>
+ <range><gt>5.0</gt><lt>5.0.21</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Stefano Di Paola reports:</p>
+ <blockquote cite="http://www.wisec.it/vulns.php?page=8">
+ <p>An authenticated user could remotely execute arbitrary
+ commands by taking advantage of a stack overflow.</p>
+ <p>To take advantage of these flaws an attacker should have
+ direct access to MySQL server communication layer (port
+ 3306 or unix socket). But if used in conjuction with some
+ web application flaws (i.e. php code injection) an
+ attacker could use socket programming (i.e. php sockets)
+ to gain access to that layer.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2006-1518</cvename>
+ <url>http://www.wisec.it/vulns.php?page=8</url>
+ <mlist msgid="1146577257.5679.217.camel@first">http://marc.theaimsgroup.com/?l=bugtraq&amp;m=114659633220473</mlist>
+ <url>http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html</url>
+ </references>
+ <dates>
+ <discovery>2006-05-02</discovery>
+ <entry>2006-05-06</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2df297a2-dc74-11da-a22b-000c6ec775d9">
- <topic>awstat -- arbitrary command execution vulnerability</topic>
+ <topic>awstats -- arbitrary command execution vulnerability</topic>
<affects>
<package>
<name>awstats</name>