=====================================================================
                                  CERT-Renater

                       Note d'Information No. 2005/VULN492
_____________________________________________________________________

DATE                      : 18/08/2005

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Solaris 10 running MySQL.

======================================================================

Sun(sm) Alert Notification
      * Sun Alert ID: 101864
      * Synopsis: Multiple Security Vulnerabilities in The "MySQL" Package
      * Category: Security
      * Product: Solaris 10 Operating System
      * BugIDs: 6258187
      * Avoidance: Patch
      * State: Resolved
      * Date Released: 11-Aug-2005
      * Date Closed: 11-Aug-2005
      * Date Modified:

1. Impact

    Multiple security vulnerabilities in the "MySQL" package, an open
    source database package bundled with Solaris 10 (see mysqld(1)), may
    result in one or more of the following issues:

    1. An unprivileged "MySQL" user may be able to access and potentially
    modify sensitive information in database tables.

    This issue is referenced in the following document:
      * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0835

    2. An unprivileged "MySQL" user may be able to disable a "MySQL"
    server causing a Denial of Service(DoS).

    This issue is referenced in the following document:
      * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0837

    3. A local unprivileged UNIX user may be able to overwrite or create
    arbitrary files on the system with the privileges of a user who
    invokes the mysqlaccess(1) script.

    This issue is referenced in the following document:
      * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004

    4. A "MySQL" user with "INSERT" and "DELETE" privileges may be able to
    execute arbitrary commands with the privileges of the "MySQL" server
    due to a security vulnerability in the "CREATE FUNCTION" command.

    This issue is referenced in the following document:
      * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0709

    5. A "MySQL" user with "INSERT" and "DELETE" privileges may be able to
    execute arbitrary commands with the privileges of the "MySQL" server
    due to a security vulnerability in the "udf_init" function.

    This issue is referenced in the following document:
      * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0710

    6. A "MySQL" user with the "CREATE TEMPORARY TABLES" privilege may be
    able to overwrite or create files on the system with the privileges of
    the "MySQL" server.

    This issue is referenced in the following document:
      * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0711

    Note: The "MySQL" server, mysqld(1), runs as an unprivileged user by
    default.

2. Contributing Factors

    This issue can occur in the following releases:

    SPARC Platform
      * Solaris 10 without patch 120292-01

    x86 Platform
      * Solaris 10 without patch 120293-01

    Note: Solaris 7, 8 and 9 are not impacted by this issue.

    In order for a system to be vulnerable to any of the issues mentioned
    above, with the exception of issue number 3, the "MySQL" server daemon
    (mysqld(1)) must be running on the system. To determine if the "MySQL"
    server daemon is running on the system, the following command can be
    executed:
     $ pgrep -lf mysqld
     107098 /usr/sfw/sbin/mysqld

    In order for the third issue described above to occur a user must
    invoke the mysqlaccess(1) script.

3. Symptoms

    There are no predictable symptoms that would indicate the described
    issues have been exploited.

4. Relief/Workaround

    In order to prevent issue number 3 above from occurring, sites may
    wish to stop users from executing the mysqlaccess(1) script until
    patches can be applied to the system.

    To disable the mysqlaccess(1) script the following command can be
    executed as the root (uid 0) user:
     # chmod 000 /usr/sfw/bin/mysqlaccess


5. Resolution

    This issue is addressed in the following releases:

    SPARC Platform
      * Solaris 10 with patch 120292-01 or later

    x86 Platform
      * Solaris 10 with patch 120293-01 or later

    This Sun Alert notification is being provided to you on an "AS IS"
    basis. This Sun Alert notification may contain information provided by
    third parties. The issues described in this Sun Alert notification may
    or may not impact your system(s). Sun makes no representations,
    warranties, or guarantees as to the information contained herein. ANY
    AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
    WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
    NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT
    YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
    INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE
    OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN.
    This Sun Alert notification contains Sun proprietary and confidential
    information. It is being provided to you pursuant to the provisions of
    your agreement to purchase services from Sun, or, if you do not have
    such an agreement, the Sun.com Terms of Use. This Sun Alert
    notification may only be used for the purposes contemplated by these
    agreements.

    Copyright 2000-2005 Sun Microsystems, Inc., 4150 Network Circle, Santa
    Clara, CA 95054 U.S.A. All rights reserved

======================================================================

         =========================================================
         Les serveurs de référence du CERT-Renater
         http://www.urec.fr/securite
         http://www.cru.fr/securite
         http://www.renater.fr
         =========================================================
         + CERT-RENATER          | tel : 01-53-94-20-44          +
         + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
         + 75013 Paris           | email: certsvp@renater.fr     +
         =========================================================


