Stefan Esser from e-matters reported various bugs in MySQL. Within the MySQL server the password checking and a signedness issue has been fixed. These could lead to a remote compromise of the system running an unpatched MySQL server. In order to exploit this bug, the remote attacker needs a valid MySQL account.
Further, a buffer overflow in the mysqlclient library has been reported and fixed. Applications using this library (as commonly used from within PHP scripts) are vulnerable to this attack and could also be compromised by remote attackers.
Since there is no workaround possible except shutting down the MySQL server, we strongly recommend an update.
Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement. Then, install the package using the command "rpm -Fhv file.rpm" to apply the update. Our maintenance customers are being notified individually. The packages are being offered to install from the maintenance web.
To be sure the update takes effect you have to restart the MySQL server by executing the following command as root:
/etc/rc.d/mysql restart
If you run applications which utilize the mysqlclient library (i.e. software that accesses a MySQL database server) make sure you restart them again to force the use of the patched libraries.
We thank MySQL Product and Release Engineer Lenz Grimmer as well as e-matters Stefan Esser who discovered the bugs for their committment to security matters and the communication of them.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center