CVE-2010-2008 : Detail

CVE-2010-2008

Command Injection
A03-Injection
1.22%V3
Network
2010-07-13
18h00 +00:00
2018-01-04
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service (server crash and database loss) via an ALTER DATABASE command with a #mysql50# string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which causes MySQL to move certain directories to the server data directory.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

Metrics

Metrics Score Severity CVSS Vector Source
V2 3.5 AV:N/AC:M/Au:S/C:N/I:N/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 14537

Publication date : 2010-08-02 22h00 +00:00
Author : Shane Bester
EDB Verified : Yes

A vulnerability was reported in MySQL. A remote authenticated user can cause denial of service conditions. This issue affects versions prior to MySQL 5.1.48. A remote authenticated user can send a specially crafted ALTER DATABASE command to cause the target server to move a data directory into a new subdirectory, causing the data directory to become unusable. A demonstration exploit request is provided [where "<special>" is "." or ".." or is a sequence that begins with "./" or "../"]: ALTER DATABASE `#mysql50#<special>` UPGRADE DATA DIRECTORY NAME Vendor advisory at: http://dev.mysql.com/doc/refman/5.1/en/news-5-1-48.html

Products Mentioned

Configuraton 0

Oracle>>Mysql >> Version To (excluding) 5.1.48

Configuraton 0

Canonical>>Ubuntu_linux >> Version 6.06

Canonical>>Ubuntu_linux >> Version 8.04

Canonical>>Ubuntu_linux >> Version 9.10

Canonical>>Ubuntu_linux >> Version 10.04

Canonical>>Ubuntu_linux >> Version 10.10

Canonical>>Ubuntu_linux >> Version 11.04

Canonical>>Ubuntu_linux >> Version 11.10

Configuraton 0

Fedoraproject>>Fedora >> Version 13

References

http://www.ubuntu.com/usn/USN-1397-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://bugs.mysql.com/bug.php?id=53804
Tags : x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2010/1918
Tags : vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/41198
Tags : vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1024160
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/40333
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1017-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.mandriva.com/security/advisories?name=MDVSA-2010:155
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/40762
Tags : third-party-advisory, x_refsource_SECUNIA