[LWN Logo]

Date:         Thu, 9 Mar 2000 15:28:02 -0800
From: Katie Moussouris <k8e@MAIL.TURBOLINUX.COM>
Subject:      [TL-Security-Announce] MySQL-3.22.27-5 and earlier TLSA200006-1
To: BUGTRAQ@SECURITYFOCUS.COM

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        TurboLinux Security Announcement


        Package: MySQL-3.22.27-5 and earlier
        Date:   Thu Mar  9 13:48:52 PST 2000

        Affected TurboLinux versions: 6.0.2 and earlier
        Vulnerability Type:  remote, possible MySQL DoS
	TurboLinux Advisory ID#:  TLSA200006-1
	BugTraq ID#: 975
        Credits:  This vulnerability was posted to the Bugtraq mailing list on
	February 8, 2000 by Robert van der Meulen <rvdm@cistron.nl>.
______________________________________________________________________________

A security hole was discovered in the package mentioned above.
Please update the package in your installation as soon as possible or disable the service.
_____________________________________________________________________________

1. Problem Summary

   The MySQL database server (prior to 3.22.32) has a flawed password
   authentication mechanism.  Anyone who can connect to the server can
   access databases without knowing an exact password.  When a check string
   of length one is passed to the server, only one character is compared.
   There are only 32 possibilities for the first character of the server-side
   check string.

2. Impact

   An attacker will have all of the access rights of the database user and
   may be able to read, add, or modify records.  From Robert's original post:
   "This vulnerability also incorporates a MySQL DoS attack, as the attacker
   can shutdown database servers and delete data, if she logs in with the
   MySQL management account."

3. Solution

  Update the package from our ftp server by running the following command:

  rpm -Fv ftp_path_to_filename

  Where ftp_path_to_filename is the following:

  ftp://ftp.turbolinux.com/pub/updates/6.0/security/MySQL-3.22.32-1.i386.rpm

  The source rpm can be downloaded here:

  ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/MySQL-3.22.32-1.src.rpm

  **Note: You must rebuild and install the rpm if you choose to download
  and install the srpm.  Simply installing the srpm alone WILL NOT CLOSE
  THE SECURITY HOLE.

  Please verify the md5 checksum of the update before you install:

  MD5 sum				Package Name
- ------------------------------------------------------------
590e3085c4c281e44cfc807d0c05439d  MySQL-3.22.32-1.i386.rpm
3eaf76a010ce4482cf9d55643485b9c3  MySQL-3.22.32-1.src.rpm
______________________________________________________________________________

You can find more updates on our ftp server:

  ftp://ftp.turbolinux.com/pub/updates/6.0/security/ for TL6.0 Workstation and Server security updates
  ftp://ftp.turbolinux.com/pub/updates/4.0/security/ for TL4.0 Workstation and Server security updates

Our webpage for security announcements:

  http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:
  rt-security@turbolinux.com
______________________________________________________________________________

Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues in TurboLinux products. Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates and alerts. Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security-announce
______________________________________________________________________________

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
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=Hh08
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE4yDKG7eR7bnHQKeQRAnj2AJ91OR5NP55EuxiTaGUx9CGf/d55QACgl9La
lmOQA80SmG5vbDzxacFIrho=
=vjJw
-----END PGP SIGNATURE-----



_______________________________________________
TL-Security-Announce mailing list
TL-Security-Announce@www.turbolinux.com
http://www.turbolinux.com/mailman/listinfo/tl-security-announce