MySQL 5.1.x prior to 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mysql mysql 5.1.23 |
||
mysql mysql 5.1.32 |
||
mysql mysql 5.1.5 |
||
oracle mysql 5.1 |
||
oracle mysql 5.1.1 |
||
oracle mysql 5.1.2 |
||
oracle mysql 5.1.3 |
||
oracle mysql 5.1.4 |
||
oracle mysql 5.1.6 |
||
oracle mysql 5.1.7 |
||
oracle mysql 5.1.8 |
||
oracle mysql 5.1.9 |
||
oracle mysql 5.1.10 |
||
oracle mysql 5.1.11 |
||
oracle mysql 5.1.12 |
||
oracle mysql 5.1.13 |
||
oracle mysql 5.1.14 |
||
oracle mysql 5.1.15 |
||
oracle mysql 5.1.16 |
||
oracle mysql 5.1.17 |
||
oracle mysql 5.1.18 |
||
oracle mysql 5.1.19 |
||
oracle mysql 5.1.20 |
||
oracle mysql 5.1.21 |
||
oracle mysql 5.1.22 |
||
oracle mysql 5.1.30 |