CVE-2012-4452

MySQL 5.0.88, and possibly other versions and platforms, allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value. NOTE: this vulnerability exists because of a CVE-2009-4030 regression, which was not omitted in other packages and versions such as MySQL 5.0.95 in Red Hat Enterprise Linux 6.
Configurations

Configuration 1 (hide)

cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:42

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2013-0121.html - () http://rhn.redhat.com/errata/RHSA-2013-0121.html -
References () http://www.openwall.com/lists/oss-security/2012/09/27/1 - () http://www.openwall.com/lists/oss-security/2012/09/27/1 -
References () http://www.securityfocus.com/bid/55715 - () http://www.securityfocus.com/bid/55715 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=860808 - () https://bugzilla.redhat.com/show_bug.cgi?id=860808 -

Information

Published : 2012-10-09 23:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-4452

Mitre link : CVE-2012-4452

CVE.ORG link : CVE-2012-4452


JSON object : View

Products Affected

oracle

  • mysql
CWE
CWE-264

Permissions, Privileges, and Access Controls