98292 2003-04-10 06:14 /81 rader/ WireX Security <security@wirex.com> Importerad: 2003-04-10 06:14 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Extern mottagare: immunix-announce@immunix.org Extern mottagare: linsec@lists.seifried.org Mottagare: Bugtraq (import) <4431> Ärende: Immunix Secured OS 7+ MySQL update ------------------------------------------------------------ ----------------------------------------------------------------------- Immunix Secured OS Security Advisory Packages updated: mysql mysqlclient9 Affected products: 7+ Bugs fixed: CAN-2002-1373 CAN-2002-1374 CAN-2002-1375 CAN-2002-1376 Date: Tue Apr 8 2003 Advisory ID: IMNX-2003-7+-008-01 Author: Alan Olsen ----------------------------------------------------------------------- Description: There have been a number of vulnerabilities found in MySQL and the MySQL Client package. Unfortunately, Immunix does not protect against all of these problems. Our recomendation is to upgrade these packages immediately. CAN-2002-1373 Signed integer vulnerability in the COM_TABLE_DUMP package for MySQL 3.23.x before 3.23.54 allows remote attackers to cause a denial of service (crash or hang) in mysqld by causing large negative integers to be provided to a memcpy call. CAN-2002-1374 The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password. CAN-2002-1375 The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6, allows remote attackers to execute arbitrary code via a long response. CAN-2002-1376 libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6, does not properly verify length fields for certain responses in the (1) read_rows or (2) read_one_row routines, which allows remote attackers to cause a denial of service and possibly execute arbitrary code. Package names and locations: Precompiled binary packages for Immunix 7+ are available at: http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-3.23.54a-3.70_imnx_1.i386.rpm http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-devel-3.23.54a-3.70_imnx_1.i386.rpm http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-server-3.23.54a-3.70_imnx_1.i386.rpm http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysqlclient9-3.23.22-8_imnx_1.i386.rpm Immunix OS 7+ md5sums: 6663ff1a67627810d06c82f667f199fc mysql-3.23.54a-3.70_imnx_1.i386.rpm 997db1d0e02aabc1da5aac79f3120e2e mysql-devel-3.23.54a-3.70_imnx_1.i386.rpm 728f760e70b718fd29e4e14027e9070e mysql-server-3.23.54a-3.70_imnx_1.i386.rpm 7055336008114ceec23872238412882d mysqlclient9-3.23.22-8_imnx_1.i386.rpm GPG verification: Our public key is available at <http://wirex.com/security/GPG_KEY>. NOTE: Ibiblio is graciously mirroring our updates, so if the links above are slow, please try: ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/ or one of the many mirrors available at: http://www.ibiblio.org/pub/Linux/MIRRORS.html ImmunixOS 6.2 is no longer officially supported. ImmunixOS 7.0 is no longer officially supported. Contact information: To report vulnerabilities, please contact security@wirex.com. WireX attempts to conform to the RFP vulnerability disclosure protocol <http://www.wiretrip.net/rfp/policy.html>. (98292) /WireX Security <security@wirex.com>/(Ombruten) Bilaga (application/pgp-signature) i text 98293 98293 2003-04-10 06:14 /9 rader/ WireX Security <security@wirex.com> Bilagans filnamn: "signature.asc" Importerad: 2003-04-10 06:14 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Extern mottagare: immunix-announce@immunix.org Extern mottagare: linsec@lists.seifried.org Mottagare: Bugtraq (import) <4432> Bilaga (text/plain) till text 98292 Ärende: Bilaga (signature.asc) till: Immunix Secured OS 7+ MySQL update ------------------------------------------------------------ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQA+lPUjVQcWL60UVMsRAvWsAKCHraiPmTjHJQFPxsUVZ8jWcDgA7gCfX36z BPstSr4dgTRCC+lXZyxylJI= =oDzM -----END PGP SIGNATURE----- (98293) /WireX Security <security@wirex.com>/------- 98617 2003-04-12 11:05 /81 rader/ WireX Security Team <security@wirex.com> Importerad: 2003-04-12 11:05 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Extern mottagare: immunix-announce@immunix.org Extern mottagare: linsec@lists.seifried.org Mottagare: Bugtraq (import) <4482> Ärende: Immunix Secured OS 7+ MySQL update ------------------------------------------------------------ ----------------------------------------------------------------------- Immunix Secured OS Security Advisory Packages updated: mysql mysqlclient9 Affected products: 7+ Bugs fixed: CAN-2002-1373 CAN-2002-1374 CAN-2002-1375 CAN-2002-1376 Date: Tue Apr 8 2003 Advisory ID: IMNX-2003-7+-008-01 Author: Alan Olsen ----------------------------------------------------------------------- Description: There have been a number of vulnerabilities found in MySQL and the MySQL Client package. Unfortunately, Immunix does not protect against all of these problems. Our recomendation is to upgrade these packages immediately. CAN-2002-1373 Signed integer vulnerability in the COM_TABLE_DUMP package for MySQL 3.23.x before 3.23.54 allows remote attackers to cause a denial of service (crash or hang) in mysqld by causing large negative integers to be provided to a memcpy call. CAN-2002-1374 The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password. CAN-2002-1375 The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6, allows remote attackers to execute arbitrary code via a long response. CAN-2002-1376 libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6, does not properly verify length fields for certain responses in the (1) read_rows or (2) read_one_row routines, which allows remote attackers to cause a denial of service and possibly execute arbitrary code. Package names and locations: Precompiled binary packages for Immunix 7+ are available at: http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-3.23.54a-3.70_imnx_1.i386.rpm http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-devel-3.23.54a-3.70_imnx_1.i386.rpm http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysql-server-3.23.54a-3.70_imnx_1.i386.rpm http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/mysqlclient9-3.23.22-8_imnx_1.i386.rpm Immunix OS 7+ md5sums: 6663ff1a67627810d06c82f667f199fc mysql-3.23.54a-3.70_imnx_1.i386.rpm 997db1d0e02aabc1da5aac79f3120e2e mysql-devel-3.23.54a-3.70_imnx_1.i386.rpm 728f760e70b718fd29e4e14027e9070e mysql-server-3.23.54a-3.70_imnx_1.i386.rpm 7055336008114ceec23872238412882d mysqlclient9-3.23.22-8_imnx_1.i386.rpm GPG verification: Our public key is available at <http://wirex.com/security/GPG_KEY>. NOTE: Ibiblio is graciously mirroring our updates, so if the links above are slow, please try: ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/ or one of the many mirrors available at: http://www.ibiblio.org/pub/Linux/MIRRORS.html ImmunixOS 6.2 is no longer officially supported. ImmunixOS 7.0 is no longer officially supported. Contact information: To report vulnerabilities, please contact security@wirex.com. WireX attempts to conform to the RFP vulnerability disclosure protocol <http://www.wiretrip.net/rfp/policy.html>. (98617) /WireX Security Team <security@wirex.com>/(Ombruten) Bilaga (application/pgp-signature) i text 98618 98618 2003-04-12 11:05 /9 rader/ WireX Security Team <security@wirex.com> Bilagans filnamn: "signature.asc" Importerad: 2003-04-12 11:05 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Extern mottagare: immunix-announce@immunix.org Extern mottagare: linsec@lists.seifried.org Mottagare: Bugtraq (import) <4483> Bilaga (text/plain) till text 98617 Ärende: Bilaga (signature.asc) till: Immunix Secured OS 7+ MySQL update ------------------------------------------------------------ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQA+lRo8VQcWL60UVMsRAlQoAJsEcKDtr2ofxs9C/+B+LK0LAVEWbwCcC8z5 7VVosTg0m4C+SUVMG8k1IJc= =ibY1 -----END PGP SIGNATURE----- (98618) /WireX Security Team <security@wirex.com>/--