On Fri, Jul 04, 2008 at 02:56:00PM +0200, Tomas Hoger wrote:
> Looks like upstream patch is incomplete.  Have you already notified
> upstream about the problem?

Not yet -- I still need to hand verify it against a pristine upstream; it's
reproducible with 5.0.51a from Sid, but the implementation of the path check
has changed significantly from the original patch.  I'll look into that once I
get a workable fix out for etch.


> > In terms of exploitability, this allows any user with permissions to
> > create tables in a db the ability to read from, write to and delete
> > tables from any other database within the same mysql instance.
> 
> Can you possibly explain this a little closer?  MySQL should not allow
> you to overwrite existing tables via DATA/INDEX DIRECTORY directives.
> So you can only get access to tables created in the future, if you can
> predict their names.  Or have you managed to escalate privileges to
> already existing tables using this flaw?

Sorry, I was taking the temporal part of the attack as read -- yes, the attack
is still based on creating the hostile tables before the victim database does.

-- 
Devin  \ aqua(at)devin.com, IRC:Requiem; http://www.devin.com
Carraway \ 1024D/E9ABFCD2: 13E7 199E DD1E 65F0 8905 2E43 5395 CA0D E9AB FCD2

Attachment: signature.asc
Description: Digital signature

Reply via email to