MySQL 5.0.88, and possibly other versions and platforms, allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value. NOTE: this vulnerability exists because of a CVE-2009-4030 regression, which was not omitted in other packages and versions such as MySQL 5.0.95 in Red Hat Enterprise Linux 6.
MySQL v5.0.88 enlaces simbólicos, y posiblemente otras versiones y plataformas, permite a usuarios locales eludir ciertos privilegios llamando a CREATE TABLE en una tabla MyISAM con argumentos (1) DATA DIRECTORY o (2) INDEX DIRECTORY modificados que son originalmente asociados con rutas sin enlaces simbólicos, y que pueden apuntar a tablas creadas en un momento futuro en el que una ruta es modificada para contener un enlace simbólico a un subdirectorio del directorio de datos de MySQL. Se trata de un problema relacionado con el cálculo incorrecto del valor mysql_unpacked_real_data_home . NOTA: esta vulnerabilidad se debe a una regresión al CVE-2009-4030, que no fue evitado en algunos paquetes y versiones probados, como MySQL v5.0.95 en Red Hat Enterprise Linux 6.
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was found that the fix for the CVE-2009-4030 issue, a flaw in the way MySQL checked the paths used as arguments for the DATA DIRECTORY and INDEX DIRECTORY directives when the "datadir" option was configured with a relative path, was incorrectly removed when the mysql packages in Red Hat Enterprise Linux 5 were updated to version 5.0.95 via RHSA-2012:0127. An authenticated attacker could use this flaw to bypass the restriction preventing the use of subdirectories of the MySQL data directory being used as DATA DIRECTORY and INDEX DIRECTORY paths. This update re-applies the fix for CVE-2009-4030.