National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2006-4227 Detail

Current Description

MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine's definer instead of the routine's caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.

Source:  MITRE      Last Modified:  08/18/2006      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2006-4227
Original release date:
08/18/2006
Last revised:
10/10/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
6.5 MEDIUM
Vector:
(AV:N/AC:L/Au:S/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
8.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Required to exploit
Impact Type:
Provides unauthorized access, Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (07/25/2008)

This issue did not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4. Issue was addressed in MySQL packages as shipped in Red Hat Enterprise Linux 5 via: https://rhn.redhat.com/errata/RHSA-2008-0364.html

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://bugs.mysql.com/bug.php?id=18630 Exploit External Source CONFIRM http://bugs.mysql.com/bug.php?id=18630
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html External Source CONFIRM http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html
http://lists.mysql.com/commits/7918 External Source MLIST [commits] 20060620 bk commit into 5.0 tree (kroki:1.2168) BUG#18630
http://securitytracker.com/id?1016709 External Source SECTRACK 1016709
http://www.novell.com/linux/security/advisories/2006_23_sr.html External Source SUSE SUSE-SR:2006:023
http://www.redhat.com/support/errata/RHSA-2007-0083.html Vendor Advisory External Source REDHAT RHSA-2007:0083
http://www.redhat.com/support/errata/RHSA-2008-0364.html Vendor Advisory External Source REDHAT RHSA-2008:0364
http://www.securityfocus.com/bid/19559 Exploit External Source BID 19559
http://www.ubuntu.com/usn/usn-338-1 External Source UBUNTU USN-338-1
http://www.vupen.com/english/advisories/2006/3306 Vendor Advisory External Source VUPEN ADV-2006-3306
https://exchange.xforce.ibmcloud.com/vulnerabilities/28442 External Source XF mysql-grant-execute-privilege-escalation(28442)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105 External Source OVAL oval:org.mitre.oval:def:10105

References to Check Content

Identifier:
oval:org.mitre.oval:def:10105
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:10105

Technical Details

Vulnerability Type (View All)

Change History 3 change records found - show changes