Category
Security
Release Phase
Resolved
ProductSolaris 10 Operating System
Bug Id
6258187
Date of Resolved Release11-AUG-2005
Impact
Multiple security vulnerabilities in the "MySQL" package, an open source database package bundled with Solaris 10 (see mysqld(1)), may result in one or more of the following issues:
1. An unprivileged "MySQL" user may be able to access and potentially modify sensitive information in database tables.
This issue is referenced in the following document:
2. An unprivileged "MySQL" user may be able to disable a "MySQL" server causing a Denial of Service(DoS).
This issue is referenced in the following document:
3. A local unprivileged UNIX user may be able to overwrite or create arbitrary files on the system with the privileges of a user who invokes the mysqlaccess(1) script.
This issue is referenced in the following document:
4. A "MySQL" user with "INSERT" and "DELETE" privileges may be able to execute arbitrary commands with the privileges of the "MySQL" server due to a security vulnerability in the "CREATE FUNCTION" command.
This issue is referenced in the following document:
5. A "MySQL" user with "INSERT" and "DELETE" privileges may be able to execute arbitrary commands with the privileges of the "MySQL" server due to a security vulnerability in the "udf_init" function.
This issue is referenced in the following document:
6. A "MySQL" user with the "CREATE TEMPORARY TABLES" privilege may be able to overwrite or create files on the system with the privileges of the "MySQL" server.
This issue is referenced in the following document:
Note: The "MySQL" server, mysqld(1), runs as an unprivileged user by default.
Contributing Factors
This issue can occur in the following releases:
SPARC Platform
- Solaris 10 without patch 120292-01
x86 Platform
- Solaris 10 without patch 120293-01
Note: Solaris 7, 8 and 9 are not impacted by this issue.
In order for a system to be vulnerable to any of the issues mentioned above, with the exception of issue number 3, the "MySQL" server daemon (mysqld(1)) must be running on the system. To determine if the "MySQL" server daemon is running on the system, the following command can be executed:
$ pgrep -lf mysqld
107098 /usr/sfw/sbin/mysqld
In order for the third issue described above to occur a user must invoke the mysqlaccess(1) script.
Symptoms
There are no predictable symptoms that would indicate the described issues have been exploited.
Workaround
In order to prevent issue number 3 above from occurring, sites may wish to stop users from executing the mysqlaccess(1) script until patches can be applied to the system.
To disable the mysqlaccess(1) script the following command can be executed as the root (uid 0) user:
# chmod 000 /usr/sfw/bin/mysqlaccess
Resolution
This issue is addressed in the following releases:
SPARC Platform
- Solaris 10 with patch 120292-01 or later
x86 Platform
- Solaris 10 with patch 120293-01 or later
References
120292-01
120293-01
AttachmentsThis solution has no attachment