Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Debian Security Advisory DSA 303-1 (mysql)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update to mysql announced via advisory DSA 303-1.
Insight
Insight
CVE-2003-0073: The mysql package contains a bug whereby dynamically allocated memory is freed more than once, which could be deliberately triggered by an attacker to cause a crash, resulting in a denial of service condition. In order to exploit this vulnerability, a valid username and password combination for access to the MySQL server is required. CVE-2003-0150: The mysql package contains a bug whereby a malicious user, granted certain permissions within mysql, could create a configuration file which would cause the mysql server to run as root, or any other user, rather than the mysql user. For the stable distribution (woody) both problems have been fixed in version 3.23.49-8.4. The old stable distribution (potato) is only affected by CVE-2003-0150, and this has been fixed in version 3.22.32-6.4. For the unstable distribution (sid), CVE-2003-0073 was fixed in version 4.0.12-2, and CVE-2003-0150 will be fixed soon. We recommend that you update your mysql package.
Solution
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20303-1