exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

suse.mysql.txt

suse.mysql.txt
Posted Feb 13, 2000

A security hole was discovered in mysql, version 3.22.30 and below, allowing remote database access. SuSE security site here.

tags | remote
systems | linux, suse
SHA-256 | 37c0c417de4b3cc6bc05888e062992dfc4c00d0ad7ac4fa0dc01dcf60a1760b1

suse.mysql.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________

SuSE Security Announcement

Package: mysql < 3.22.30
Date: Fri, 11 Feb 2000 21:54:49 GMT

Affected SuSE versions: all
Vulnerability Type: remote database access
SuSE default package: no
Other affected systems: all unix systems using mysql < 3.22.30
______________________________________________________________________________

A security hole was discovered in the package mentioned above.
Please update as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).

Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.

Please note, that that we provide this information on an "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________

1. Problem Description

A bug in the authentication function of mysql allows anyone who knows
a valid username to successfully authenticate as that users in no more
than 32 tries.

2. Impact

Remote users may gain access to the mysql database data.

3. Solution

Update the package from our FTP server.
Please note that it will take some time until rpms for 6.1 are available,
because the security patch does not work on that tree. As a workaround, you
might try the rpm for SuSE 6.2
______________________________________________________________________________

Please verify these md5 checksums of the updates before installing:
(6.1 updates are not available yet. You might try the 6.2 rpm in the meantime.)

f54f552d0d7137ae9c2fa44968e32e25 ftp://ftp.suse.com/pub/suse/axp/update/6.3/pay1/mysql-3.22.30-4.alpha.rpm
ff61bdf78c72bb8906578533581188b5 ftp://ftp.suse.com/pub/suse/i386/update/6.2/pay1/mysql-3.22.30-4.i386.rpm
7e8415360e52a100ffb759099dbc8f25 ftp://ftp.suse.com/pub/suse/i386/update/6.3/pay1/mysql-3.22.30-4.i386.rpm
______________________________________________________________________________

You can find updates on our ftp-Server:

ftp://ftp.suse.com/pub/suse/i386/update for Intel processors
ftp://ftp.suse.com/pub/suse/axp/update for Alpha processors

or try the following web pages for a list of mirrors:
http://www.suse.de/ftp.html
http://www.suse.com/ftp_new.html

Our webpage for patches:
http://www.suse.de/patches/index.html

Our webpage for security announcements:
http://www.suse.de/security

If you want to report vulnerabilities, please contact
security@suse.de
______________________________________________________________________________

SuSE has got two free security mailing list services to which any
interested party may subscribe:

suse-security@suse.com - moderated and for general/linux/SuSE
security discussions. All SuSE security
announcements are send to this list.

suse-security-announce@suse.com - SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent
to this list.

To subscribe to the list, send a message to:
<suse-security-subscribe@suse.com>

To remove your address from the list, send a message to:
<suse-security-unsubscribe@suse.com>

Send mail to the following for info and FAQ for this list:
<suse-security-info@suse.com>
<suse-security-faq@suse.com>

_____________________________________________________________________________

This information is provided freely to everyone interested and may
be redistributed provided that it is not altered in any way.

Type Bits/KeyID Date User ID
pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security@suse.de>

- ------BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i
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=pIeS
- ------END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBOKXYLney5gA9JdPZAQF2XwgAlNWcXOQbDIBJvZNEVAG4jcjdMWUk+CKJ
nuB3DRyYTfzN1bY7xw3YzdMLWjZtcy3viEjTIfNKsworG6KbOaNuZ/99IxOJjH6a
p+D1RX9XP5E5nxKtiqCnNgsWRp/LAwzQJbsoD/68RPQ7vZwVjGVe1eFYeTh+w7xO
3GD9Y2MNuPi6oUTY9XytWihOO5HbGYcmVV2Ii1bOqNuh7RNVczA+Q3Tc1uD83mrW
sfak1Zn1aI403hwxMAKdnRtXxtCNYeqdchIh389U65qOdvty978gqKBmEHcJXhGq
XK17XmPRY2yu7zxu3RO5+yI42QUX8378Ghh6v0v+KRFXH00QuCktvw==
=/NcB
-----END PGP SIGNATURE-----

--
To unsubscribe, e-mail: suse-security-announce-unsubscribe@suse.com
For additional commands, e-mail: suse-security-announce-help@suse.com


Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close