Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 303-1 (mysql)

Information

Severity

Severity

Critical

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

9.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to mysql announced via advisory DSA 303-1.

Insight

Insight

CVE-2003-0073: The mysql package contains a bug whereby dynamically allocated memory is freed more than once, which could be deliberately triggered by an attacker to cause a crash, resulting in a denial of service condition. In order to exploit this vulnerability, a valid username and password combination for access to the MySQL server is required. CVE-2003-0150: The mysql package contains a bug whereby a malicious user, granted certain permissions within mysql, could create a configuration file which would cause the mysql server to run as root, or any other user, rather than the mysql user. For the stable distribution (woody) both problems have been fixed in version 3.23.49-8.4. The old stable distribution (potato) is only affected by CVE-2003-0150, and this has been fixed in version 3.22.32-6.4. For the unstable distribution (sid), CVE-2003-0073 was fixed in version 4.0.12-2, and CVE-2003-0150 will be fixed soon. We recommend that you update your mysql package.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20303-1

Common Vulnerabilities and Exposures (CVE)