Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2004.0520 -- Debian Security Advisory DSA 540-1 New mysql packages fix insecure temporary file creation 19 August 2004 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: MySQL 4.0.20-10 and prior Publisher: Debian Operating System: Debian GNU/Linux 3.0 Linux variants Impact: Modify Arbitrary Files Access: Existing Account CVE Names: CAN-2004-0457 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 540-1 security@debian.org http://www.debian.org/security/ Martin Schulze August 18th, 2004 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : mysql Vulnerability : insecure file creation Problem-Type : local Debian-specific: no CVE ID : CAN-2004-0457 Jeroen van Wolffelaar <jeroen@wolffelaar.nl> discovered an insecure temporary file vulnerability in the mysqlhotcopy script when using the scp method which is part of the mysql-server packge For the stable distribution (woody) this problem has been fixed in version 3.23.49-8.7 of mysql. For the unstable distribution (sid) this problem has been fixed in version 4.0.20-11 of mysql-dfsg. We recommend that you upgrade your mysql-server package. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/m/mysql/mysql_3.23.49-8.7.dsc Size/MD5 checksum: 875 0253bc04d4342b0b47be1ac4be381fcb http://security.debian.org/pool/updates/main/m/mysql/mysql_3.23.49-8.7.diff.gz Size/MD5 checksum: 62203 56ed69d5cf8f501a3dfcd26c5424967b http://security.debian.org/pool/updates/main/m/mysql/mysql_3.23.49.orig.tar.gz Size/MD5 checksum: 11861035 a2820d81997779a9fdf1f4b3c321564a Architecture independent components: http://security.debian.org/pool/updates/main/m/mysql/mysql-common_3.23.49-8.7_all.deb Size/MD5 checksum: 16966 0d4cd91f0862c147d2a4fcb190220e46 http://security.debian.org/pool/updates/main/m/mysql/mysql-doc_3.23.49-8.5_all.deb Size/MD5 checksum: 1962992 a4cacebaadf9d5988da0ed1a336b48e6 Alpha architecture: http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.7_alpha.deb Size/MD5 checksum: 277782 84bbf59abaf73966c82c335af4e0ef33 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.7_alpha.deb Size/MD5 checksum: 778838 d40cc28047accb94bb6c2cad46c46830 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.7_alpha.deb Size/MD5 checksum: 163608 35b77731392a90711e8a0d4f4452380d http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.7_alpha.deb Size/MD5 checksum: 3634314 633ac1e9469ee237a98b591a48c3e07b ARM architecture: http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.7_arm.deb Size/MD5 checksum: 238392 b75905023a478a1f94b5a7208ec8976e http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.7_arm.deb Size/MD5 checksum: 634684 371509a46f9810a8332435743a59ec68 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.7_arm.deb Size/MD5 checksum: 124018 c5502886cc95d7c30e61c37b5236c7ab http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.7_arm.deb Size/MD5 checksum: 2806166 8273e10a96155956e136d16308f0c733 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.7_i386.deb Size/MD5 checksum: 234728 d750bba77d074b2c08214a4079f71993 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.7_i386.deb Size/MD5 checksum: 576628 a56c5b97161e912ae083aa77aeceaeda http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.7_i386.deb Size/MD5 checksum: 122568 e2ca446cef57cffc83e3c4424436fb48 http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.7_i386.deb Size/MD5 checksum: 2800660 83d57e469ffe22060c25cc7ad0275b90 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.7_ia64.deb Size/MD5 checksum: 315114 d4130def7e18f8df5b666a6a6f76e04c http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.7_ia64.deb Size/MD5 checksum: 848640 1c224cfb5bb1a353267111b5e5332340 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.7_ia64.deb Size/MD5 checksum: 173834 e12daa69c9d09caa8a2a89fe139ba2ae http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.7_ia64.deb Size/MD5 checksum: 4000194 0a9a09412a045fc321db24cae47855fd HP Precision architecture: http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.7_hppa.deb Size/MD5 checksum: 280660 82775e57a5f2149525b22913360b1b7b http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.7_hppa.deb Size/MD5 checksum: 743766 a0ab2c3dee3a7f21353993beb69af4be http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.7_hppa.deb Size/MD5 checksum: 140656 9f420fba715ddddb8449c92f726cd535 http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.7_hppa.deb Size/MD5 checksum: 3514790 24fe02cf3d7ad3a3e875ae5192248fe6 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.7_m68k.deb Size/MD5 checksum: 227724 6b369645a2ab31d3b9e3818376f96f14 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.7_m68k.deb Size/MD5 checksum: 557870 950f89f1e47451bcada42afbfc1616b3 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.7_m68k.deb Size/MD5 checksum: 118440 fcf4b08ce268a75860c30534bc24c7c3 http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.7_m68k.deb Size/MD5 checksum: 2646646 d2280764c2e1f01bbfe3c3d4f168cf20 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.7_mips.deb Size/MD5 checksum: 250988 cccf9eeaa5124a56cf44746b1f041d67 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.7_mips.deb Size/MD5 checksum: 689130 88f5d5d1643099bd81706d64a6af3c2b http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.7_mips.deb Size/MD5 checksum: 133938 89f000380c7e3b13f87e8fca48e00e7e http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.7_mips.deb Size/MD5 checksum: 2848238 c970656b529ebe83d7e8b40e5b4cd8f6 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.7_mipsel.deb Size/MD5 checksum: 250664 e53634cf126c1568a9a4d594cd233497 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.7_mipsel.deb Size/MD5 checksum: 688600 072446a7a7f6c3a68a2a27b44fe86d93 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.7_mipsel.deb Size/MD5 checksum: 134302 a371a6148b5d8447fdd4bc351c60aaab http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.7_mipsel.deb Size/MD5 checksum: 2839356 9ddea423e6af652be2cccb798ee5b79b PowerPC architecture: http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.7_powerpc.deb Size/MD5 checksum: 247750 d0834fcb13cd965944cd2e333fde4e1b http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.7_powerpc.deb Size/MD5 checksum: 652692 d95b165e3d32e7c0fed77894b26d4099 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.7_powerpc.deb Size/MD5 checksum: 129464 6c5a3a147f8addfb11468363ac9d359f http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.7_powerpc.deb Size/MD5 checksum: 2823174 a9b047917ec5434d43822012b71a7089 IBM S/390 architecture: http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.7_s390.deb Size/MD5 checksum: 250064 ff9145b181f1444666dad04737a150e0 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.7_s390.deb Size/MD5 checksum: 607144 0e83a668c929ced395cf3ca606e0f12c http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.7_s390.deb Size/MD5 checksum: 126464 68d3a65090e78b4f55b2a9a462a950fb http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.7_s390.deb Size/MD5 checksum: 2691100 45694091af758ba8caa1a377770f21f8 Sun Sparc architecture: http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.7_sparc.deb Size/MD5 checksum: 241270 4e646c1bb89ead3639a17687841520c2 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.7_sparc.deb Size/MD5 checksum: 615778 d8c22eaba1f675ee99e5b86f3eedbd5e http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.7_sparc.deb Size/MD5 checksum: 130430 fbd382e2af812d545810ea0dd3813ad6 http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.7_sparc.deb Size/MD5 checksum: 2939782 9094961028c0f5d32fa1c5aebf5beec2 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFBIwmqW5ql+IAeqTIRAi1+AJ9gPrR8ovOY2w4y1uYPMRDCaj1lKQCdE4aO yQ846+VXr8T4FUQG/3x2jb0= =/XFC - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQSP1ZSh9+71yA2DNAQKt2AQAklrnDq9NNFxSIMRLOLQC962yS2DKFu2Q PfRJltrM97sMDN6o6fsdKHGX3ajqdQcf2IHeoj2+Uo0BfKLDw4sSJ5TaRf1JBmiF IvhdBy3vJQvNPbRKZTTldgz4nmuu7yOB6txKMIgKKmwXQ+r2TV3czqKEX8cC3QHy NQtVR/cVhXw= =er43 -----END PGP SIGNATURE-----