ID CVE-2012-0075
Summary Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors.
References
Vulnerable Configurations
  • MySQL 5.1
    cpe:2.3:a:mysql:mysql:5.1
  • MySQL 5.1.1
    cpe:2.3:a:mysql:mysql:5.1.1
  • MySQL 5.1.2
    cpe:2.3:a:mysql:mysql:5.1.2
  • MySQL 5.1.3
    cpe:2.3:a:mysql:mysql:5.1.3
  • MySQL 5.1.4
    cpe:2.3:a:mysql:mysql:5.1.4
  • MySQL 5.1.5
    cpe:2.3:a:mysql:mysql:5.1.5
  • MySQL 5.1.5a
    cpe:2.3:a:mysql:mysql:5.1.5a
  • MySQL 5.1.6
    cpe:2.3:a:mysql:mysql:5.1.6
  • MySQL 5.1.7
    cpe:2.3:a:mysql:mysql:5.1.7
  • MySQL 5.1.8
    cpe:2.3:a:mysql:mysql:5.1.8
  • MySQL 5.1.9
    cpe:2.3:a:mysql:mysql:5.1.9
  • MySQL 5.1.10
    cpe:2.3:a:mysql:mysql:5.1.10
  • MySQL 5.1.11
    cpe:2.3:a:mysql:mysql:5.1.11
  • MySQL 5.1.12
    cpe:2.3:a:mysql:mysql:5.1.12
  • MySQL 5.1.13
    cpe:2.3:a:mysql:mysql:5.1.13
  • MySQL 5.1.14
    cpe:2.3:a:mysql:mysql:5.1.14
  • MySQL 5.1.15
    cpe:2.3:a:mysql:mysql:5.1.15
  • MySQL 5.1.16
    cpe:2.3:a:mysql:mysql:5.1.16
  • MySQL 5.1.17
    cpe:2.3:a:mysql:mysql:5.1.17
  • MySQL 5.1.18
    cpe:2.3:a:mysql:mysql:5.1.18
  • MySQL 5.1.19
    cpe:2.3:a:mysql:mysql:5.1.19
  • MySQL 5.1.20
    cpe:2.3:a:mysql:mysql:5.1.20
  • MySQL 5.1.21
    cpe:2.3:a:mysql:mysql:5.1.21
  • MySQL 5.1.22
    cpe:2.3:a:mysql:mysql:5.1.22
  • MySQL 5.1.23
    cpe:2.3:a:mysql:mysql:5.1.23
  • MySQL 5.1.23a
    cpe:2.3:a:mysql:mysql:5.1.23:a
  • MySQL 5.1.23_bk
    cpe:2.3:a:mysql:mysql:5.1.23_bk
  • MySQL 5.1.23a
    cpe:2.3:a:mysql:mysql:5.1.23a
  • MySQL 5.1.24
    cpe:2.3:a:mysql:mysql:5.1.24
  • MySQL 5.1.25
    cpe:2.3:a:mysql:mysql:5.1.25
  • MySQL 5.1.26
    cpe:2.3:a:mysql:mysql:5.1.26
  • MySQL 5.1.27
    cpe:2.3:a:mysql:mysql:5.1.27
  • MySQL 5.1.28
    cpe:2.3:a:mysql:mysql:5.1.28
  • MySQL 5.1.29
    cpe:2.3:a:mysql:mysql:5.1.29
  • MySQL 5.1.30
    cpe:2.3:a:mysql:mysql:5.1.30
  • MySQL 5.1.31
    cpe:2.3:a:mysql:mysql:5.1.31
  • MySQL 5.1.31 Service Pack 1
    cpe:2.3:a:mysql:mysql:5.1.31:sp1
  • MySQL 5.1.32
    cpe:2.3:a:mysql:mysql:5.1.32
  • MySQL 5.1.32-bzr
    cpe:2.3:a:mysql:mysql:5.1.32-bzr
  • MySQL 5.1.33
    cpe:2.3:a:mysql:mysql:5.1.33
  • MySQL 5.1.34
    cpe:2.3:a:mysql:mysql:5.1.34
  • MySQL 5.1.34 Service Pack 1
    cpe:2.3:a:mysql:mysql:5.1.34:sp1
  • MySQL 5.1.35
    cpe:2.3:a:mysql:mysql:5.1.35
  • MySQL 5.1.36
    cpe:2.3:a:mysql:mysql:5.1.36
  • MySQL 5.1.37
    cpe:2.3:a:mysql:mysql:5.1.37
  • MySQL 5.1.37 Service Pack 1
    cpe:2.3:a:mysql:mysql:5.1.37:sp1
  • MySQL 5.1.38
    cpe:2.3:a:mysql:mysql:5.1.38
  • MySQL 5.1.39
    cpe:2.3:a:mysql:mysql:5.1.39
  • MySQL 5.1.40
    cpe:2.3:a:mysql:mysql:5.1.40
  • MySQL 5.1.40 Service Pack 1
    cpe:2.3:a:mysql:mysql:5.1.40:sp1
  • MySQL 5.1.41
    cpe:2.3:a:mysql:mysql:5.1.41
  • MySQL 5.1.42
    cpe:2.3:a:mysql:mysql:5.1.42
  • MySQL 5.1.43
    cpe:2.3:a:mysql:mysql:5.1.43
  • MySQL 5.1.43 Service Pack 1
    cpe:2.3:a:mysql:mysql:5.1.43:sp1
  • MySQL 5.1.44
    cpe:2.3:a:mysql:mysql:5.1.44
  • MySQL 5.1.45
    cpe:2.3:a:mysql:mysql:5.1.45
  • MySQL 5.1.46
    cpe:2.3:a:mysql:mysql:5.1.46
  • MySQL 5.1.46 Service Pack 1
    cpe:2.3:a:mysql:mysql:5.1.46:sp1
  • MySQL 5.1.47
    cpe:2.3:a:mysql:mysql:5.1.47
  • MySQL 5.1.48
    cpe:2.3:a:mysql:mysql:5.1.48
  • MySQL 5.1.49
    cpe:2.3:a:mysql:mysql:5.1.49
  • MySQL 5.1.49 Service Pack 1
    cpe:2.3:a:mysql:mysql:5.1.49:sp1
  • MySQL 5.1.50
    cpe:2.3:a:mysql:mysql:5.1.50
  • Oracle MySQL 5.1.51
    cpe:2.3:a:oracle:mysql:5.1.51
  • Oracle MySQL 5.1.52
    cpe:2.3:a:oracle:mysql:5.1.52
  • Oracle MySQL 5.1.52 Service Pack 1
    cpe:2.3:a:oracle:mysql:5.1.52:sp1
  • Oracle MySQL 5.1.53
    cpe:2.3:a:oracle:mysql:5.1.53
  • Oracle MySQL 5.1.54
    cpe:2.3:a:oracle:mysql:5.1.54
  • Oracle MySQL 5.1.55
    cpe:2.3:a:oracle:mysql:5.1.55
  • Oracle MySQL 5.1.56
    cpe:2.3:a:oracle:mysql:5.1.56
  • Oracle MySQL 5.1.57
    cpe:2.3:a:oracle:mysql:5.1.57
  • Oracle MySQL 5.1.58
    cpe:2.3:a:oracle:mysql:5.1.58
  • Oracle MySQL 5.1.59
    cpe:2.3:a:oracle:mysql:5.1.59
  • Oracle MySQL 5.1.60
    cpe:2.3:a:oracle:mysql:5.1.60
  • Oracle MySQL 5.1.61
    cpe:2.3:a:oracle:mysql:5.1.61
  • MySQL 5.5.0
    cpe:2.3:a:mysql:mysql:5.5.0
  • Oracle MySQL 5.5.1
    cpe:2.3:a:oracle:mysql:5.5.1
  • Oracle MySQL 5.5.2
    cpe:2.3:a:oracle:mysql:5.5.2
  • Oracle MySQL 5.5.3
    cpe:2.3:a:oracle:mysql:5.5.3
  • Oracle MySQL 5.5.4
    cpe:2.3:a:oracle:mysql:5.5.4
  • Oracle MySQL 5.5.5
    cpe:2.3:a:oracle:mysql:5.5.5
  • Oracle MySQL 5.5.6
    cpe:2.3:a:oracle:mysql:5.5.6
  • Oracle MySQL 5.5.7
    cpe:2.3:a:oracle:mysql:5.5.7
  • Oracle MySQL 5.5.8
    cpe:2.3:a:oracle:mysql:5.5.8
  • Oracle MySQL 5.5.9
    cpe:2.3:a:oracle:mysql:5.5.9
  • Oracle MySQL 5.5.10
    cpe:2.3:a:oracle:mysql:5.5.10
  • Oracle MySQL 5.5.11
    cpe:2.3:a:oracle:mysql:5.5.11
  • Oracle MySQL 5.5.12
    cpe:2.3:a:oracle:mysql:5.5.12
  • Oracle MySQL 5.5.13
    cpe:2.3:a:oracle:mysql:5.5.13
  • Oracle MySQL 5.5.14
    cpe:2.3:a:oracle:mysql:5.5.14
  • Oracle MySQL 5.5.15
    cpe:2.3:a:oracle:mysql:5.5.15
  • Oracle MySQL 5.5.16
    cpe:2.3:a:oracle:mysql:5.5.16
  • Oracle MySQL 5.5.17
    cpe:2.3:a:oracle:mysql:5.5.17
  • Oracle MySQL 5.5.18
    cpe:2.3:a:oracle:mysql:5.5.18
  • Oracle MySQL 5.5.19
    cpe:2.3:a:oracle:mysql:5.5.19
  • Oracle MySQL 5.5.20
    cpe:2.3:a:oracle:mysql:5.5.20
  • Oracle MySQL 5.5.21
    cpe:2.3:a:oracle:mysql:5.5.21
  • MySQL 5.0
    cpe:2.3:a:mysql:mysql:5.0
  • MySQL MySQL 5.0.0
    cpe:2.3:a:mysql:mysql:5.0.0
  • MySQL MySQL 5.0.0 alpha
    cpe:2.3:a:mysql:mysql:5.0.0:alpha
  • MySQL MySQL 5.0.0.0
    cpe:2.3:a:mysql:mysql:5.0.0.0
  • MySQL MySQL 5.0.1
    cpe:2.3:a:mysql:mysql:5.0.1
  • MySQL MySQL 5.0.1a
    cpe:2.3:a:mysql:mysql:5.0.1a
  • MySQL MySQL 5.0.2
    cpe:2.3:a:mysql:mysql:5.0.2
  • MySQL MySQL 5.0.3
    cpe:2.3:a:mysql:mysql:5.0.3
  • MySQL MySQL 5.0.3 Beta
    cpe:2.3:a:mysql:mysql:5.0.3:beta
  • MySQL MySQL 5.0.3a
    cpe:2.3:a:mysql:mysql:5.0.3a
  • MySQL MySQL 5.0.4
    cpe:2.3:a:mysql:mysql:5.0.4
  • MySQL MySQL 5.0.4a
    cpe:2.3:a:mysql:mysql:5.0.4a
  • MySQL MySQL 5.0.5
    cpe:2.3:a:mysql:mysql:5.0.5
  • cpe:2.3:a:mysql:mysql:5.0.5.0.21
    cpe:2.3:a:mysql:mysql:5.0.5.0.21
  • MySQL MySQL 5.0.6
    cpe:2.3:a:mysql:mysql:5.0.6
  • MySQL MySQL 5.0.7
    cpe:2.3:a:mysql:mysql:5.0.7
  • MySQL MySQL 5.0.8
    cpe:2.3:a:mysql:mysql:5.0.8
  • MySQL MySQL 5.0.9
    cpe:2.3:a:mysql:mysql:5.0.9
  • MySQL MySQL 5.0.10
    cpe:2.3:a:mysql:mysql:5.0.10
  • MySQL MySQL 5.0.10a
    cpe:2.3:a:mysql:mysql:5.0.10a
  • MySQL MySQL 5.0.11
    cpe:2.3:a:mysql:mysql:5.0.11
  • MySQL MySQL 5.0.12
    cpe:2.3:a:mysql:mysql:5.0.12
  • MySQL MySQL 5.0.13
    cpe:2.3:a:mysql:mysql:5.0.13
  • MySQL MySQL 5.0.14
    cpe:2.3:a:mysql:mysql:5.0.14
  • MySQL MySQL 5.0.15
    cpe:2.3:a:mysql:mysql:5.0.15
  • MySQL MySQL 5.0.15a
    cpe:2.3:a:mysql:mysql:5.0.15a
  • MySQL MySQL 5.0.16
    cpe:2.3:a:mysql:mysql:5.0.16
  • MySQL MySQL 5.0.16a
    cpe:2.3:a:mysql:mysql:5.0.16a
  • MySQL MySQL 5.0.17
    cpe:2.3:a:mysql:mysql:5.0.17
  • MySQL MySQL 5.0.17a
    cpe:2.3:a:mysql:mysql:5.0.17a
  • MySQL MySQL 5.0.18
    cpe:2.3:a:mysql:mysql:5.0.18
  • MySQL MySQL 5.0.19
    cpe:2.3:a:mysql:mysql:5.0.19
  • MySQL MySQL 5.0.20
    cpe:2.3:a:mysql:mysql:5.0.20
  • MySQL MySQL 5.0.20a
    cpe:2.3:a:mysql:mysql:5.0.20a
  • MySQL MySQL 5.0.21
    cpe:2.3:a:mysql:mysql:5.0.21
  • MySQL MySQL 5.0.22
    cpe:2.3:a:mysql:mysql:5.0.22
  • cpe:2.3:a:mysql:mysql:5.0.22.1.0.1
    cpe:2.3:a:mysql:mysql:5.0.22.1.0.1
  • MySQL 5.0.23
    cpe:2.3:a:mysql:mysql:5.0.23
  • MySQL MySQL 5.0.24
    cpe:2.3:a:mysql:mysql:5.0.24
  • MySQL 5.0.24a
    cpe:2.3:a:mysql:mysql:5.0.24a
  • MySQL 5.0.25
    cpe:2.3:a:mysql:mysql:5.0.25
  • MySQL 5.0.26
    cpe:2.3:a:mysql:mysql:5.0.26
  • MySQL MySQL 5.0.27
    cpe:2.3:a:mysql:mysql:5.0.27
  • MySQL 5.0.30
    cpe:2.3:a:mysql:mysql:5.0.30
  • MySQL 5.0.30 Service Pack 1
    cpe:2.3:a:mysql:mysql:5.0.30:sp1
  • MySQL 5.0.32
    cpe:2.3:a:mysql:mysql:5.0.32
  • MySQL MySQL 5.0.33
    cpe:2.3:a:mysql:mysql:5.0.33
  • MySQL 5.0.36
    cpe:2.3:a:mysql:mysql:5.0.36
  • MySQL MySQL 5.0.37
    cpe:2.3:a:mysql:mysql:5.0.37
  • MySQL 5.0.38
    cpe:2.3:a:mysql:mysql:5.0.38
  • MySQL5.0.41
    cpe:2.3:a:mysql:mysql:5.0.41
  • MySQL5.0.42
    cpe:2.3:a:mysql:mysql:5.0.42
  • MySQL5.0.44
    cpe:2.3:a:mysql:mysql:5.0.44
  • MySQL5.0.45
    cpe:2.3:a:mysql:mysql:5.0.45
  • cpe:2.3:a:mysql:mysql:5.0.45:b
    cpe:2.3:a:mysql:mysql:5.0.45:b
  • cpe:2.3:a:mysql:mysql:5.0.45b
    cpe:2.3:a:mysql:mysql:5.0.45b
  • MySQL5.0.50
    cpe:2.3:a:mysql:mysql:5.0.50
  • cpe:2.3:a:mysql:mysql:5.0.51
    cpe:2.3:a:mysql:mysql:5.0.51
  • MySQL 5.0.51a
    cpe:2.3:a:mysql:mysql:5.0.51a
  • MySQL 5.0.51b
    cpe:2.3:a:mysql:mysql:5.0.51b
  • MySQL5.0.52
    cpe:2.3:a:mysql:mysql:5.0.52
  • MySQL5.0.54
    cpe:2.3:a:mysql:mysql:5.0.54
  • MySQL5.0.56
    cpe:2.3:a:mysql:mysql:5.0.56
  • MySQL5.0.60
    cpe:2.3:a:mysql:mysql:5.0.60
  • MySQL5.0.66
    cpe:2.3:a:mysql:mysql:5.0.66
  • MySQL5.0.67
    cpe:2.3:a:mysql:mysql:5.0.67
  • MySQL5.0.75
    cpe:2.3:a:mysql:mysql:5.0.75
  • MySQL5.0.77
    cpe:2.3:a:mysql:mysql:5.0.77
  • Mysql 5.0.81
    cpe:2.3:a:mysql:mysql:5.0.81
  • MySQL5.0.82
    cpe:2.3:a:mysql:mysql:5.0.82
  • MySQL5.0.83
    cpe:2.3:a:mysql:mysql:5.0.83
  • MySQL5.0.84
    cpe:2.3:a:mysql:mysql:5.0.84
  • MySQL5.0.85
    cpe:2.3:a:mysql:mysql:5.0.85
  • MySQL5.0.86
    cpe:2.3:a:mysql:mysql:5.0.86
  • MySQL5.0.87
    cpe:2.3:a:mysql:mysql:5.0.87
  • MySQL5.0.88
    cpe:2.3:a:mysql:mysql:5.0.88
  • MySQL5.0.89
    cpe:2.3:a:mysql:mysql:5.0.89
  • MySQL5.0.90
    cpe:2.3:a:mysql:mysql:5.0.90
  • MySQL5.0.91
    cpe:2.3:a:mysql:mysql:5.0.91
  • MySQL5.0.92
    cpe:2.3:a:mysql:mysql:5.0.92
  • MySQL5.0.93
    cpe:2.3:a:mysql:mysql:5.0.93
  • MySQL5.0.94
    cpe:2.3:a:mysql:mysql:5.0.94
CVSS
Base: 1.7 (as of 19-01-2012 - 11:27)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK HIGH MULTIPLE_INSTANCES
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
nessus via4
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1397-1.NASL
    description Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.61 in Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS has been updated to MySQL 5.0.95. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information : http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.ht ml. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 58325
    published 2012-03-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58325
    title Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities (USN-1397-1)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201308-06.NASL
    description The remote host is affected by the vulnerability described in GLSA-201308-06 (MySQL: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in MySQL. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could send a specially crafted request, possibly resulting in execution of arbitrary code with the privileges of the application or a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 69508
    published 2013-08-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69508
    title GLSA-201308-06 : MySQL: Multiple vulnerabilities
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0105.NASL
    description Updated mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2011-2262, CVE-2012-0075, CVE-2012-0087, CVE-2012-0101, CVE-2012-0102, CVE-2012-0112, CVE-2012-0113, CVE-2012-0114, CVE-2012-0115, CVE-2012-0116, CVE-2012-0118, CVE-2012-0119, CVE-2012-0120, CVE-2012-0484, CVE-2012-0485, CVE-2012-0490, CVE-2012-0492) These updated packages upgrade MySQL to version 5.1.61. Refer to the MySQL release notes for a full list of changes : http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 57878
    published 2012-02-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57878
    title CentOS 6 : mysql (CESA-2012:0105)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2012-44.NASL
    description This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2011-2262 , CVE-2012-0075 , CVE-2012-0087 , CVE-2012-0101 , CVE-2012-0102 , CVE-2012-0112 , CVE-2012-0113 , CVE-2012-0114 , CVE-2012-0115 , CVE-2012-0116 , CVE-2012-0118 , CVE-2012-0119 , CVE-2012-0120 , CVE-2012-0484 , CVE-2012-0485 , CVE-2012-0490 , CVE-2012-0492) These updated packages upgrade MySQL to version 5.1.61. Refer to the MySQL release notes for a full list of changes :
    last seen 2019-02-21
    modified 2018-11-19
    plugin id 69651
    published 2013-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69651
    title Amazon Linux AMI : mysql (ALAS-2012-44)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2012-273.NASL
    description mysql update to version 5.5.23 fixes several security issues and bugs. Please refer to the following upstream announcements for details : - http://dev.mysql.com/doc/refman/5.5/en/news-5-5-16.html - http://dev.mysql.com/doc/refman/5.5/en/news-5-5-17.html - http://dev.mysql.com/doc/refman/5.5/en/news-5-5-18.html - http://dev.mysql.com/doc/refman/5.5/en/news-5-5-19.html - http://dev.mysql.com/doc/refman/5.5/en/news-5-5-20.html - http://dev.mysql.com/doc/refman/5.5/en/news-5-5-21.html - http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html - http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html
    last seen 2018-11-20
    modified 2018-11-19
    plugin id 74623
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74623
    title openSUSE Security Update : mysql-community-server (openSUSE-2012-273)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0127.NASL
    description From Red Hat Security Advisory 2012:0127 : Updated mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2012-0075, CVE-2012-0087, CVE-2012-0101, CVE-2012-0102, CVE-2012-0114, CVE-2012-0484, CVE-2012-0490) These updated packages upgrade MySQL to version 5.0.95. Refer to the MySQL release notes for a full list of changes : http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68457
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68457
    title Oracle Linux 5 : mysql (ELSA-2012-0127)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2429.NASL
    description Due to the non-disclosure of security patch information from Oracle, we are forced to ship an upstream version update of MySQL 5.1. There are several known incompatible changes, which are listed in /usr/share/doc/mysql-server/NEWS.Debian.gz. Several security vulnerabilities were discovered in MySQL, a database management system. The vulnerabilities are addressed by upgrading MySQL to a new upstream version, 5.1.61, which includes additional changes, such as performance improvements and corrections for data loss defects. These changes are described in the MySQL release notes at: .
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 58277
    published 2012-03-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58277
    title Debian DSA-2429-1 : mysql-5.1 - several vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2012-274.NASL
    description mariadb update to version 5.2.12 fixes several security issues and bugs. Please refer to the following upstream announcements for details : http://kb.askmonty.org/v/mariadb-5212-release-notes http://kb.askmonty.org/v/mariadb-5211-release-notes http://kb.askmonty.org/v/mariadb-5210-release-notes
    last seen 2019-02-21
    modified 2018-12-18
    plugin id 74624
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74624
    title openSUSE Security Update : mariadb (openSUSE-2012-274)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_LIBMYSQLCLIENT-DEVEL-120731.NASL
    description MySQL has been upgraded to version 5.0.96 to fix several vulnerabilities.
    last seen 2019-02-21
    modified 2015-01-13
    plugin id 64183
    published 2013-01-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64183
    title SuSE 11.1 Security Update : MySQL (SAT Patch Number 6613)
  • NASL family Databases
    NASL id MYSQL_5_0_95.NASL
    description The version of MySQL 5.0 installed on the remote host is earlier than 5.0.95. Such versions are affected by multiple vulnerabilities. Details are not public yet.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 57604
    published 2012-01-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57604
    title MySQL 5.0 < 5.0.95 Multiple Vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0105.NASL
    description Updated mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2011-2262, CVE-2012-0075, CVE-2012-0087, CVE-2012-0101, CVE-2012-0102, CVE-2012-0112, CVE-2012-0113, CVE-2012-0114, CVE-2012-0115, CVE-2012-0116, CVE-2012-0118, CVE-2012-0119, CVE-2012-0120, CVE-2012-0484, CVE-2012-0485, CVE-2012-0490, CVE-2012-0492) These updated packages upgrade MySQL to version 5.1.61. Refer to the MySQL release notes for a full list of changes : http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 57871
    published 2012-02-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57871
    title RHEL 6 : mysql (RHSA-2012:0105)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0127.NASL
    description Updated mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2012-0075, CVE-2012-0087, CVE-2012-0101, CVE-2012-0102, CVE-2012-0114, CVE-2012-0484, CVE-2012-0490) These updated packages upgrade MySQL to version 5.0.95. Refer to the MySQL release notes for a full list of changes : http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 57951
    published 2012-02-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57951
    title CentOS 5 : mysql (CESA-2012:0127)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120208_MYSQL_ON_SL6_X.NASL
    description MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2011-2262, CVE-2012-0075, CVE-2012-0087, CVE-2012-0101, CVE-2012-0102, CVE-2012-0112, CVE-2012-0113, CVE-2012-0114, CVE-2012-0115, CVE-2012-0116, CVE-2012-0118, CVE-2012-0119, CVE-2012-0120, CVE-2012-0484, CVE-2012-0485, CVE-2012-0490, CVE-2012-0492) These updated packages upgrade MySQL to version 5.1.61. Refer to the MySQL release notes for a full list of changes : http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61239
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61239
    title Scientific Linux Security Update : mysql on SL6.x i386/x86_64
  • NASL family Databases
    NASL id MYSQL_5_5_20.NASL
    description The version of MySQL 5.5 installed on the remote host is earlier than 5.5.20. Such versions are affected by multiple, as yet unspecified vulnerabilities.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 57606
    published 2012-01-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57606
    title MySQL 5.5 < 5.5.20 Multiple Vulnerabilities
  • NASL family F5 Networks Local Security Checks
    NASL id F5_BIGIP_SOL14410.NASL
    description For BIG-IP systems using the MySQL database, the following MySQL vulnerabilities may allow local users to gain knowledge of sensitive information, manipulate certain data, or cause a Denial of Service (DoS):CVE-2011-2262 CVE-2012-0075 CVE-2012-0087 CVE-2012-0101 CVE-2012-0102 CVE-2012-0112 CVE-2012-0113 CVE-2012-0114 CVE-2012-0115 CVE-2012-0116 CVE-2012-0117 CVE-2012-0118 CVE-2012-0119 CVE-2012-0120 CVE-2012-0484 CVE-2012-0485 CVE-2012-0486 CVE-2012-0487 CVE-2012-0488 CVE-2012-0489 CVE-2012-0490 CVE-2012-0491 CVE-2012-0492 CVE-2012-0493 CVE-2012-0494 CVE-2012-0495 CVE-2012-0496 For Enterprise Manager systems, the following MySQL vulnerability may also allow remote users to gain knowledge of sensitive information, manipulate certain data, or cause a DoS : CVE-2011-2262
    last seen 2019-02-21
    modified 2019-01-04
    plugin id 78149
    published 2014-10-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78149
    title F5 Networks BIG-IP : Multiple MySQL vulnerabilities (K14410)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-0972.NASL
    description - Update to MySQL 5.5.20, for various fixes described at http://dev.mysql.com/doc/refman/5.5/en/news-5-5-20.html as well as security fixes described at http://www.oracle.com/technetwork/topics/security/cpujan 2012-366304.html - Re-include the mysqld logrotate script, now that it's not so bogus Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-20
    plugin id 57865
    published 2012-02-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57865
    title Fedora 16 : mysql-5.5.20-1.fc16 (2012-0972)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-0987.NASL
    description Update to MySQL 5.5.20, for various fixes described at http://dev.mysql.com/doc/refman/5.5/en/news-5-5-20.html as well as security fixes described at http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.ht ml Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-20
    plugin id 57899
    published 2012-02-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57899
    title Fedora 15 : mysql-5.5.20-1.fc15 (2012-0987)
  • NASL family Databases
    NASL id MYSQL_5_1_61.NASL
    description The version of MySQL 5.1 installed on the remote host is earlier than 5.1.61. Such versions are affected by multiple, as yet unspecified vulnerabilities.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 57605
    published 2012-01-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57605
    title MySQL 5.1 < 5.1.61 Multiple Vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0127.NASL
    description Updated mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2012-0075, CVE-2012-0087, CVE-2012-0101, CVE-2012-0102, CVE-2012-0114, CVE-2012-0484, CVE-2012-0490) These updated packages upgrade MySQL to version 5.0.95. Refer to the MySQL release notes for a full list of changes : http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 57930
    published 2012-02-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57930
    title RHEL 5 : mysql (RHSA-2012:0127)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120213_MYSQL_ON_SL5_X.NASL
    description MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page. (CVE-2012-0075, CVE-2012-0087, CVE-2012-0101, CVE-2012-0102, CVE-2012-0114, CVE-2012-0484, CVE-2012-0490) These updated packages upgrade MySQL to version 5.0.95. Refer to the MySQL release notes for a full list of changes : http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61246
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61246
    title Scientific Linux Security Update : mysql on SL5.x i386/x86_64
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0105.NASL
    description From Red Hat Security Advisory 2012:0105 : Updated mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2011-2262, CVE-2012-0075, CVE-2012-0087, CVE-2012-0101, CVE-2012-0102, CVE-2012-0112, CVE-2012-0113, CVE-2012-0114, CVE-2012-0115, CVE-2012-0116, CVE-2012-0118, CVE-2012-0119, CVE-2012-0120, CVE-2012-0484, CVE-2012-0485, CVE-2012-0490, CVE-2012-0492) These updated packages upgrade MySQL to version 5.1.61. Refer to the MySQL release notes for a full list of changes : http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68453
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68453
    title Oracle Linux 6 : mysql (ELSA-2012-0105)
redhat via4
rpms
  • mysql-0:5.1.61-1.el6_2.1
  • mysql-bench-0:5.1.61-1.el6_2.1
  • mysql-devel-0:5.1.61-1.el6_2.1
  • mysql-embedded-0:5.1.61-1.el6_2.1
  • mysql-embedded-devel-0:5.1.61-1.el6_2.1
  • mysql-libs-0:5.1.61-1.el6_2.1
  • mysql-server-0:5.1.61-1.el6_2.1
  • mysql-test-0:5.1.61-1.el6_2.1
  • mysql-0:5.0.95-1.el5_7.1
  • mysql-bench-0:5.0.95-1.el5_7.1
  • mysql-devel-0:5.0.95-1.el5_7.1
  • mysql-server-0:5.0.95-1.el5_7.1
  • mysql-test-0:5.0.95-1.el5_7.1
refmap via4
bid 51526
confirm
debian DSA-2429
gentoo GLSA-201308-06
osvdb 78374
secunia
  • 48250
  • 53372
suse SUSE-SU-2012:0984
ubuntu USN-1397-1
xf mysql-server-cve20120075(72539)
Last major update 20-02-2014 - 23:47
Published 18-01-2012 - 17:55
Last modified 20-07-2018 - 21:29
Back to Top