CVE-2008-4097
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
MySQL 5.0.51a allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are associated with symlinks within pathnames for subdirectories of the MySQL home data directory, which are followed when tables are created in the future. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-2079.
MySQL 5.0.51a permite a los usuarios locales evitar la comprobaciĆ³n de ciertos privilegios por la llamada a CREATE TABLE en una tabla MyISAM con argumentos modificados (1) DATA DIRECTORY o (2) INDEX DIRECTORY que son asociados con symlinks dentro de nombres de ruta (pathnames), para subdirectorios del directorio de datos principal de MySQL , el cual es seguido cuando las tablas son creadas en el futuro. NOTA: Esta vulnerabilidad por una incompleta soluciĆ³n para CVE-2008-2079.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-09-15 CVE Reserved
- 2008-09-17 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25 | Third Party Advisory | |
http://secunia.com/advisories/32769 | Broken Link | |
http://www.openwall.com/lists/oss-security/2008/09/09/20 | Mailing List | |
http://www.openwall.com/lists/oss-security/2008/09/16/3 | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45648 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html | 2020-02-18 | |
http://secunia.com/advisories/32759 | 2020-02-18 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:094 | 2020-02-18 | |
http://www.ubuntu.com/usn/USN-671-1 | 2020-02-18 |