← Voltar para CVEs
CVE-2005-0709
N/ADescricao
MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado5/2/2005
Ultima modificacao4/16/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
mysql:mysqloracle:mysql
Fraquezas (CWE)
CWE-94
Referencias
http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html(secalert@redhat.com)
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html(secalert@redhat.com)
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html(secalert@redhat.com)
http://marc.info/?l=bugtraq&m=111066115808506&w=2(secalert@redhat.com)
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1(secalert@redhat.com)
http://www.debian.org/security/2005/dsa-707(secalert@redhat.com)
http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:060(secalert@redhat.com)
http://www.novell.com/linux/security/advisories/2005_19_mysql.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2005-334.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2005-348.html(secalert@redhat.com)
http://www.securityfocus.com/bid/12781(secalert@redhat.com)
http://www.trustix.org/errata/2005/0009/(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479(secalert@redhat.com)
https://usn.ubuntu.com/96-1/(secalert@redhat.com)
http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=111066115808506&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-707(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:060(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2005_19_mysql.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2005-334.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2005-348.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/12781(af854a3a-2127-422b-91ae-364da2661108)
http://www.trustix.org/errata/2005/0009/(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/96-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.