Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://bugs.mysql.com/bug.php?id=32167", "name": "http://bugs.mysql.com/bug.php?id=32167", "tags": ["Exploit", "Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html", "name": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html", "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html", "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html", "name": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/29106", "name": "29106", "tags": ["Patch", "Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "http://www.securitytracker.com/id?1019995", "name": "1019995", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/30134", "name": "30134", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2008-0510.html", "name": "RHSA-2008:0510", "tags": ["Third Party Advisory"], "refsource": "REDHAT"}, {"url": "http://secunia.com/advisories/31226", "name": "31226", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.debian.org/security/2008/dsa-1608", "name": "DSA-1608", "tags": ["Third Party Advisory"], "refsource": "DEBIAN"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150", "name": "MDVSA-2008:150", "tags": ["Third Party Advisory"], "refsource": "MANDRIVA"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149", "name": "MDVSA-2008:149", "tags": ["Third Party Advisory"], "refsource": "MANDRIVA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2008-0505.html", "name": "RHSA-2008:0505", "tags": ["Third Party Advisory"], "refsource": "REDHAT"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html", "name": "SUSE-SR:2008:017", "tags": ["Third Party Advisory"], "refsource": "SUSE"}, {"url": "http://secunia.com/advisories/31066", "name": "31066", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/31687", "name": "31687", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.securityfocus.com/bid/31681", "name": "31681", "tags": ["Patch", "Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html", "name": "APPLE-SA-2008-10-09", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "APPLE"}, {"url": "http://support.apple.com/kb/HT3216", "name": "http://support.apple.com/kb/HT3216", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/32222", "name": "32222", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html", "name": "RHSA-2008:0768", "tags": ["Third Party Advisory"], "refsource": "REDHAT"}, {"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html", "name": "APPLE-SA-2009-09-10-2", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "APPLE"}, {"url": "http://secunia.com/advisories/36701", "name": "36701", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://support.apple.com/kb/HT3865", "name": "http://support.apple.com/kb/HT3865", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.vupen.com/english/advisories/2008/1472/references", "name": "ADV-2008-1472", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2008/2780", "name": "ADV-2008-2780", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://www.ubuntu.com/usn/USN-671-1", "name": "USN-671-1", "tags": ["Third Party Advisory"], "refsource": "UBUNTU"}, {"url": "http://secunia.com/advisories/32769", "name": "32769", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html", "name": "RHSA-2009:1289", "tags": ["Third Party Advisory"], "refsource": "REDHAT"}, {"url": "http://secunia.com/advisories/36566", "name": "36566", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267", "name": "mysql-myisam-security-bypass(42267)", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "XF"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133", "name": "oval:org.mitre.oval:def:10133", "tags": ["Third Party Advisory"], "refsource": "OVAL"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-264"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2008-2079", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 4.6, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "HIGH", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": true}}, "publishedDate": "2008-05-05T16:20Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "4.1.24", "versionStartIncluding": "4.1.0"}, {"cpe23Uri": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.0.60", "versionStartIncluding": "5.0.0"}, {"cpe23Uri": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.1.24", "versionStartIncluding": "5.1.0"}, {"cpe23Uri": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "6.0.5", "versionStartIncluding": "6.0.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2019-12-17T15:25Z"}