Bug 445222 (CVE-2008-2079) - CVE-2008-2079 mysql: privilege escalation via DATA/INDEX DIRECTORY directives
Summary: CVE-2008-2079 mysql: privilege escalation via DATA/INDEX DIRECTORY directives
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-2079
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 445321 445804 445805 445806 445856 445857 448486 448487
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-05-05 15:31 UTC by Tomas Hoger
Modified: 2021-11-12 19:49 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
: 969506 (view as bug list)
Environment:
Last Closed: 2010-01-08 14:21:44 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0505 0 normal SHIPPED_LIVE Moderate: Red Hat Application Stack v2.1 security and enhancement update 2008-07-02 13:15:28 UTC
Red Hat Product Errata RHSA-2008:0510 0 normal SHIPPED_LIVE Moderate: Red Hat Application Stack v1.3 security and enhancement update 2008-07-02 13:05:39 UTC
Red Hat Product Errata RHSA-2008:0768 0 normal SHIPPED_LIVE Moderate: mysql security, bug fix, and enhancement update 2008-07-24 17:12:22 UTC
Red Hat Product Errata RHSA-2009:1289 0 normal SHIPPED_LIVE Moderate: mysql security and bug fix update 2009-09-01 13:32:14 UTC

Description Tomas Hoger 2008-05-05 15:31:42 UTC
MySQL 4.1.24, 5.0.60, 5.1.24, and 6.0.5 fixes an issue allowing an authenticated
attacker to gain privileges to tables that will be created by some other
database user in future using MyISAM storage engine, if an attacker can predict
names of such tables.

Attacker can create a table using DATA/INDEX DIRECTORY directives causing data
and index files (.MYD/.MYI) to be created in some other directory writable by
mysql server, including directories used to store table files of other users'
databases.  If victim later creates table with the same name, attacker's data
and index files are overwritten by victim's files, but access privileges are not
revoked.  Attacker gains access to newly created victim's table.

References:
http://bugs.mysql.com/bug.php?id=32167
http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html
http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html

Comment 1 Tomas Hoger 2008-05-05 15:34:40 UTC
Affected versions shipped in:
- Red Hat Enterprise Linux 4, 5
- Red Hat Applications Stack v1, v2
- Fedora 7, 8, 9

Not affected versions shipped in:
- Red Hat Enterprise Linux 2.1, 3 (DATA/INDEX DIRECTORY directives are not
  supported)

Comment 13 Tomas Hoger 2008-07-04 13:14:49 UTC
It was discovered that the upstream fix for this issue is incomplete.  See bug
#454077 for details.

Comment 14 errata-xmlrpc 2009-09-02 09:45:23 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2009:1289 https://rhn.redhat.com/errata/RHSA-2009-1289.html

Comment 15 errata-xmlrpc 2009-09-02 12:09:57 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2009:1289 https://rhn.redhat.com/errata/RHSA-2009-1289.html


Note You need to log in before you can comment on or make changes to this bug.