Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: [oss-security] Re: MySQL (Linux) Stack based buffer overrun PoC Zeroday
From: king cope <isowarez.isowarez.isowarez () googlemail com>
Date: Mon, 3 Dec 2012 16:52:55 +0100

Yes you are way right.
Don't patch it!

2012/12/3 Sergei Golubchik <serg () askmonty org>:
Hi, king cope!

On Dec 02, king cope wrote:
My opinion is that the FILE to admin privilege elevation should be
patched.  What is the reason to have FILE and ADMIN privileges
seperated when with this exploit FILE privileges equate to ALL ADMIN
I understand that it's insecure to have FILE privileges attached to a
user.  But if this a configuration issue and not a vulnerability then
as stated above there must be something wrong with the privilege
management in this SQL server.

You've missed that part of my reply:

Additionally, MySQL (and MariaDB) provides a --secure-file-priv
option that allows to restrict all FILE operations to a specific

Normally, if a DBA wants to grant FILE privilege to users, the server
will have something like secure-file-priv=/tmp/mysql (for example)
specified in the configuration file. This way any operation allowed by
the FILE privilege (like SELECT ... OUTFILE) will only be able to access
files under the /tmp/mysql/ path.


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]