SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Database)  >   MySQL Vendors:   MySQL.com, Oracle
(Red Hat Issues Fix) MySQL Multiple Bugs Let Remote Users Access and Modify Data, Remote and Local Users Deny Service, and Local Users Modify Data and Gain Elevated Privileges
SecurityTracker Alert ID:  1037684
SecurityTracker URL:  http://securitytracker.com/id/1037684
CVE Reference:   CVE-2016-5616   (Links to External Site)
Date:  Jan 24 2017
Impact:   Denial of service via local system, Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.5.52 and prior, 5.6.33 and prior, 5.7.15 and prior
Description:   Multiple vulnerabilities were reported in MySQL. A remote user can access and modify data on the target system. A remote or local user can cause denial of service conditions on the target system. A local user can modify data on the target system. A local user can obtain elevated privileges on the target system.

A local user can exploit a flaw in the Server: Error Handling component to gain elevated privileges [CVE-2016-5617].

A local user can exploit a flaw in the Server: MyISAM component to gain elevated privileges [CVE-2016-5616].

A local user can exploit a flaw in the Server: Packaging component to gain elevated privileges [CVE-2016-5625].

A remote authenticated user can exploit a flaw in the Server: DML component to cause denial of service conditions [CVE-2016-5609, CVE-2016-5612, CVE-2016-5624].

A remote authenticated user can exploit a flaw in the Server: GIS component to cause denial of service conditions [CVE-2016-5626].

A remote authenticated user can exploit a flaw in the Server: InnoDB component to cause denial of service conditions [CVE-2016-5627].

A remote authenticated user can exploit a flaw in the Server: Optimizer component to cause denial of service conditions [CVE-2016-3492].

A remote user can exploit a flaw in the Connector/Python component to partially access data, partially modify data, and partially deny service [CVE-2016-5598].

A local user can exploit a flaw in the Server: Security: Encryption component to access data [CVE-2016-7440].

A remote authenticated user can exploit a flaw in the Server: DML component to cause denial of service conditions [CVE-2016-5628].

A remote authenticated user can exploit a flaw in the Server: Federated component to cause denial of service conditions [CVE-2016-5629].

A remote authenticated user can exploit a flaw in the Server: InnoDB component to cause denial of service conditions [CVE-2016-3495, CVE-2016-5630, CVE-2016-5507].

A remote authenticated user can exploit a flaw in the Server: Memcached component to cause denial of service conditions [CVE-2016-5631].

A remote authenticated user can exploit a flaw in the Server: Optimizer component to cause denial of service conditions [CVE-2016-5632].

A remote authenticated user can exploit a flaw in the Server: Performance Schema component to cause denial of service conditions [CVE-2016-5633].

A remote authenticated user can exploit a flaw in the Server: RBR component to cause denial of service conditions [CVE-2016-5634].

A remote authenticated user can exploit a flaw in the Server: Security: Audit component to cause denial of service conditions [CVE-2016-5635].

A local user can exploit a flaw in the Server: InnoDB component to partially modify data and cause denial of service conditions [CVE-2016-8289].

A remote authenticated user can exploit a flaw in the Server: Replication component to cause denial of service conditions [CVE-2016-8287].

A remote authenticated user can exploit a flaw in the Server: Performance Schema component to cause denial of service conditions [CVE-2016-8290].

A remote authenticated user can exploit a flaw in the Server: Security: Encryption component to access data [CVE-2016-5584].

A remote authenticated user can exploit a flaw in the Server: Types component to cause partial denial of service conditions [CVE-2016-8283].

A remote authenticated user can exploit a flaw in the Server: InnoDB Plugin component to partially modify data [CVE-2016-8288].

A remote authenticated user can exploit a flaw in the Server: Security: Privileges component to partially access data [CVE-2016-8286].

A local user can exploit a flaw in the Server: Replication component to cause partial denial of service conditions [CVE-2016-8284].

The following researchers reported these and other Oracle product vulnerabilities:

Abhishek Singh; Alejo Popovici; Alexander Kornbrust of Red Database Security; Amichai Shulman of Imperva, Inc.; Ariel Walter Garcia; Behzad Najjarpour Jabbari, Secunia Research at Flexera Software; bo13oy of Trend Micro's Zero Day Initiative;
Cezar Santos; David Litchfield of Google; Dawid Golunski; Denis Shpektorov; Devin Rosenbauer of Identity Works LLC; Felix Wilhelm; Hunter Liu of Huawei's IT Infrastructure & Security Dept, BPIT&QM; Jackson Thuraisamy of Security Compass;
Jacob Baines - Tenable Network Security (via Trend Micro's Zero Day Initiative); Jakub Palaczynski of ING Services Polska; John Page (hyp3rlinx); Jordan Milne; Mateusz Guzik; Matias Mevied of Onapsis; Matthias Kaiser of Code White;
Michael Miller of Integrigy; Okan Basegmez of DORASEC Consulting; Pete Finnigan; Peter Moody; Rahmat Nur Fauzi; Reno Robert; Rex Dale Stevens; Sahar Sabban of Intel; Suraj Khetani of Gulf Business Machines; Sven Blumenstein of Google; Tommy DeVoss of Evolution Security; Valentin Dornauer; and Vishnu Padmakumar.

Impact:   A remote user can obtain data on the target system.

A remote user can modify data on the target system.

A local user can cause denial of service conditions on the target system.

A remote user can cause denial of service conditions.

A local user can obtain elevated privileges on the target system.

A local user can modify data on the target system.

Solution:   Red Hat has issued a fix for CVE-2016-5616.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2017-0184.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2017-0184.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Oct 19 2016 MySQL Multiple Bugs Let Remote Users Access and Modify Data, Remote and Local Users Deny Service, and Local Users Modify Data and Gain Elevated Privileges



 Source Message Contents

Subject:  [RHSA-2017:0184-01] Important: mysql security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: mysql security update
Advisory ID:       RHSA-2017:0184-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2017-0184.html
Issue date:        2017-01-24
CVE Names:         CVE-2016-5616 CVE-2016-6662 CVE-2016-6663 
=====================================================================

1. Summary:

An update for mysql is now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

3. Description:

MySQL is a multi-user, multi-threaded SQL database server. It consists of
the MySQL server daemon (mysqld) and many client programs and libraries.

Security Fix(es):

* It was discovered that the MySQL logging functionality allowed writing to
MySQL configuration files. An administrative database user, or a database
user with FILE privileges, could possibly use this flaw to run arbitrary
commands with root privileges on the system running the database server.
(CVE-2016-6662)

* A race condition was found in the way MySQL performed MyISAM engine table
repair. A database user with shell access to the server running mysqld
could use this flaw to change permissions of arbitrary files writable by
the mysql system user. (CVE-2016-6663, CVE-2016-5616)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the MySQL server daemon (mysqld) will be
restarted automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1375198 - CVE-2016-6662 mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016)
1378936 - CVE-2016-6663 CVE-2016-5616 mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016)

6. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source:
mysql-5.1.73-8.el6_8.src.rpm

i386:
mysql-5.1.73-8.el6_8.i686.rpm
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-libs-5.1.73-8.el6_8.i686.rpm
mysql-server-5.1.73-8.el6_8.i686.rpm

x86_64:
mysql-5.1.73-8.el6_8.x86_64.rpm
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-debuginfo-5.1.73-8.el6_8.x86_64.rpm
mysql-libs-5.1.73-8.el6_8.i686.rpm
mysql-libs-5.1.73-8.el6_8.x86_64.rpm
mysql-server-5.1.73-8.el6_8.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

i386:
mysql-bench-5.1.73-8.el6_8.i686.rpm
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-devel-5.1.73-8.el6_8.i686.rpm
mysql-embedded-5.1.73-8.el6_8.i686.rpm
mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm
mysql-test-5.1.73-8.el6_8.i686.rpm

x86_64:
mysql-bench-5.1.73-8.el6_8.x86_64.rpm
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-debuginfo-5.1.73-8.el6_8.x86_64.rpm
mysql-devel-5.1.73-8.el6_8.i686.rpm
mysql-devel-5.1.73-8.el6_8.x86_64.rpm
mysql-embedded-5.1.73-8.el6_8.i686.rpm
mysql-embedded-5.1.73-8.el6_8.x86_64.rpm
mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm
mysql-embedded-devel-5.1.73-8.el6_8.x86_64.rpm
mysql-test-5.1.73-8.el6_8.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source:
mysql-5.1.73-8.el6_8.src.rpm

x86_64:
mysql-5.1.73-8.el6_8.x86_64.rpm
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-debuginfo-5.1.73-8.el6_8.x86_64.rpm
mysql-libs-5.1.73-8.el6_8.i686.rpm
mysql-libs-5.1.73-8.el6_8.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

x86_64:
mysql-bench-5.1.73-8.el6_8.x86_64.rpm
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-debuginfo-5.1.73-8.el6_8.x86_64.rpm
mysql-devel-5.1.73-8.el6_8.i686.rpm
mysql-devel-5.1.73-8.el6_8.x86_64.rpm
mysql-embedded-5.1.73-8.el6_8.i686.rpm
mysql-embedded-5.1.73-8.el6_8.x86_64.rpm
mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm
mysql-embedded-devel-5.1.73-8.el6_8.x86_64.rpm
mysql-server-5.1.73-8.el6_8.x86_64.rpm
mysql-test-5.1.73-8.el6_8.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
mysql-5.1.73-8.el6_8.src.rpm

i386:
mysql-5.1.73-8.el6_8.i686.rpm
mysql-bench-5.1.73-8.el6_8.i686.rpm
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-devel-5.1.73-8.el6_8.i686.rpm
mysql-libs-5.1.73-8.el6_8.i686.rpm
mysql-server-5.1.73-8.el6_8.i686.rpm
mysql-test-5.1.73-8.el6_8.i686.rpm

ppc64:
mysql-5.1.73-8.el6_8.ppc64.rpm
mysql-bench-5.1.73-8.el6_8.ppc64.rpm
mysql-debuginfo-5.1.73-8.el6_8.ppc.rpm
mysql-debuginfo-5.1.73-8.el6_8.ppc64.rpm
mysql-devel-5.1.73-8.el6_8.ppc.rpm
mysql-devel-5.1.73-8.el6_8.ppc64.rpm
mysql-libs-5.1.73-8.el6_8.ppc.rpm
mysql-libs-5.1.73-8.el6_8.ppc64.rpm
mysql-server-5.1.73-8.el6_8.ppc64.rpm
mysql-test-5.1.73-8.el6_8.ppc64.rpm

s390x:
mysql-5.1.73-8.el6_8.s390x.rpm
mysql-bench-5.1.73-8.el6_8.s390x.rpm
mysql-debuginfo-5.1.73-8.el6_8.s390.rpm
mysql-debuginfo-5.1.73-8.el6_8.s390x.rpm
mysql-devel-5.1.73-8.el6_8.s390.rpm
mysql-devel-5.1.73-8.el6_8.s390x.rpm
mysql-libs-5.1.73-8.el6_8.s390.rpm
mysql-libs-5.1.73-8.el6_8.s390x.rpm
mysql-server-5.1.73-8.el6_8.s390x.rpm
mysql-test-5.1.73-8.el6_8.s390x.rpm

x86_64:
mysql-5.1.73-8.el6_8.x86_64.rpm
mysql-bench-5.1.73-8.el6_8.x86_64.rpm
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-debuginfo-5.1.73-8.el6_8.x86_64.rpm
mysql-devel-5.1.73-8.el6_8.i686.rpm
mysql-devel-5.1.73-8.el6_8.x86_64.rpm
mysql-libs-5.1.73-8.el6_8.i686.rpm
mysql-libs-5.1.73-8.el6_8.x86_64.rpm
mysql-server-5.1.73-8.el6_8.x86_64.rpm
mysql-test-5.1.73-8.el6_8.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

i386:
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-embedded-5.1.73-8.el6_8.i686.rpm
mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm

ppc64:
mysql-debuginfo-5.1.73-8.el6_8.ppc.rpm
mysql-debuginfo-5.1.73-8.el6_8.ppc64.rpm
mysql-embedded-5.1.73-8.el6_8.ppc.rpm
mysql-embedded-5.1.73-8.el6_8.ppc64.rpm
mysql-embedded-devel-5.1.73-8.el6_8.ppc.rpm
mysql-embedded-devel-5.1.73-8.el6_8.ppc64.rpm

s390x:
mysql-debuginfo-5.1.73-8.el6_8.s390.rpm
mysql-debuginfo-5.1.73-8.el6_8.s390x.rpm
mysql-embedded-5.1.73-8.el6_8.s390.rpm
mysql-embedded-5.1.73-8.el6_8.s390x.rpm
mysql-embedded-devel-5.1.73-8.el6_8.s390.rpm
mysql-embedded-devel-5.1.73-8.el6_8.s390x.rpm

x86_64:
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-debuginfo-5.1.73-8.el6_8.x86_64.rpm
mysql-embedded-5.1.73-8.el6_8.i686.rpm
mysql-embedded-5.1.73-8.el6_8.x86_64.rpm
mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm
mysql-embedded-devel-5.1.73-8.el6_8.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
mysql-5.1.73-8.el6_8.src.rpm

i386:
mysql-5.1.73-8.el6_8.i686.rpm
mysql-bench-5.1.73-8.el6_8.i686.rpm
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-devel-5.1.73-8.el6_8.i686.rpm
mysql-libs-5.1.73-8.el6_8.i686.rpm
mysql-server-5.1.73-8.el6_8.i686.rpm
mysql-test-5.1.73-8.el6_8.i686.rpm

x86_64:
mysql-5.1.73-8.el6_8.x86_64.rpm
mysql-bench-5.1.73-8.el6_8.x86_64.rpm
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-debuginfo-5.1.73-8.el6_8.x86_64.rpm
mysql-devel-5.1.73-8.el6_8.i686.rpm
mysql-devel-5.1.73-8.el6_8.x86_64.rpm
mysql-libs-5.1.73-8.el6_8.i686.rpm
mysql-libs-5.1.73-8.el6_8.x86_64.rpm
mysql-server-5.1.73-8.el6_8.x86_64.rpm
mysql-test-5.1.73-8.el6_8.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

i386:
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-embedded-5.1.73-8.el6_8.i686.rpm
mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm

x86_64:
mysql-debuginfo-5.1.73-8.el6_8.i686.rpm
mysql-debuginfo-5.1.73-8.el6_8.x86_64.rpm
mysql-embedded-5.1.73-8.el6_8.i686.rpm
mysql-embedded-5.1.73-8.el6_8.x86_64.rpm
mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm
mysql-embedded-devel-5.1.73-8.el6_8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-5616
https://access.redhat.com/security/cve/CVE-2016-6662
https://access.redhat.com/security/cve/CVE-2016-6663
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFYh0DtXlSAg2UNWIIRAoXqAJ4oa8Y6dAKNNOWZ7W8UpiGaow3FtQCfQzKY
U17SwyNeztdtdaQuaVtIhqw=
=cMjq
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC