patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
92 lines
3.3 KiB
Text
92 lines
3.3 KiB
Text
-----BEGIN PGP SIGNED MESSAGE-----
|
|
|
|
=============================================================================
|
|
FreeBSD-SA-00:05 Security Advisory
|
|
FreeBSD, Inc.
|
|
|
|
Topic: MySQL allows bypassing of password authentication
|
|
|
|
Category: ports
|
|
Module: mysql322-server
|
|
Announced: 2000-02-28
|
|
Affects: Ports collection before the correction date.
|
|
Corrected: 2000-02-15
|
|
FreeBSD only: NO
|
|
|
|
I. Background
|
|
|
|
MySQL is a popular SQL database client/server distributed as part of the
|
|
FreeBSD ports collection.
|
|
|
|
II. Problem Description
|
|
|
|
The MySQL database server (versions prior to 3.22.32) has a flaw in the
|
|
password authentication mechanism which allows anyone who can connect to
|
|
the server to access databases without requiring a password, given a valid
|
|
username on the database - in other words, the normal password
|
|
authentication mechanism can be completely bypassed.
|
|
|
|
MySQL is not installed by default, nor is it "part of FreeBSD" as such: it
|
|
is part of the FreeBSD ports collection, which contains over 3100
|
|
third-party applications in a ready-to-install format.
|
|
|
|
FreeBSD makes no claim about the security of these third-party
|
|
applications, although an effort is underway to provide a security audit
|
|
of the most security-critical ports.
|
|
|
|
III. Impact
|
|
|
|
The successful attacker will have all of the access rights of that
|
|
database user and may be able to read, add or modify records.
|
|
|
|
If you have not chosen to install the mysql322-server port/package, then
|
|
your system is not vulnerable.
|
|
|
|
IV. Workaround
|
|
|
|
Use appropriate access-control lists to limit which hosts can initiate
|
|
connections to MySQL databases - see:
|
|
|
|
http://www.mysql.com/Manual_chapter/manual_Privilege_system.html
|
|
|
|
for more information. If unrestricted remote access to the database is not
|
|
required, consider using ipfw(8) or ipf(8), or your network perimeter
|
|
firewall, to prevent remote access to the database from untrusted machines
|
|
(MySQL uses TCP port 3306 for network communication). Note that users who
|
|
have access to machines which are allowed to initiate database connections
|
|
(e.g. local users) can still exploit the security hole.
|
|
|
|
V. Solution
|
|
|
|
One of the following:
|
|
|
|
1) Upgrade your entire ports collection and rebuild the mysql322-server
|
|
port.
|
|
|
|
2) Reinstall a new package obtained from:
|
|
|
|
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/databases/mysql-server-3.22.32.tgz
|
|
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-current/databases/mysql-server-3.22.32.tgz
|
|
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-current/databases/mysql-server-3.22.32.tgz
|
|
|
|
3) download a new port skeleton for the mysql322-server port from:
|
|
|
|
http://www.freebsd.org/ports/
|
|
|
|
and use it to rebuild the port.
|
|
|
|
4) Use the portcheckout utility to automate option (3) above. The
|
|
portcheckout port is available in /usr/ports/devel/portcheckout or the
|
|
package can be obtained from:
|
|
|
|
ftp://ftp.freebsd.org/pub/FreeBSD/ports/packages/devel/portcheckout-2.0.tgz
|
|
|
|
-----BEGIN PGP SIGNATURE-----
|
|
Version: 2.6.2
|
|
|
|
iQCVAwUBOLtYEVUuHi5z0oilAQHtbwP/TF0hNZwrO/wAuBjYF8Eff5aDU1KtnA9D
|
|
u0bcUakDgF/nODVxgOFZ1MfaK95PAhRqdYvtwssTqTXwlRB+PU0vtwjdt3p3l8d3
|
|
SixfhxT+Ys/v222jK+o6lJdxfKOC4chNDseboSRoCSLEESNl2NDGkBKezKSzzlng
|
|
vzxtva695bI=
|
|
=KYqf
|
|
-----END PGP SIGNATURE-----
|