CVE-2016-6664

mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.
References
Link Resource
http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html Exploit Third Party Advisory
http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2016-2130.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2749.html Third Party Advisory
http://seclists.org/fulldisclosure/2016/Nov/4 Mailing List Third Party Advisory
http://www.debian.org/security/2017/dsa-3770 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/539695/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/93612 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2192 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0279 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0574 Third Party Advisory
https://security.gentoo.org/glsa/201702-18 Third Party Advisory
https://www.exploit-db.com/exploits/40679/ Exploit Third Party Advisory VDB Entry
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ Vendor Advisory
http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html Exploit Third Party Advisory
http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2016-2130.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2749.html Third Party Advisory
http://seclists.org/fulldisclosure/2016/Nov/4 Mailing List Third Party Advisory
http://www.debian.org/security/2017/dsa-3770 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/539695/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/93612 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2192 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0279 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0574 Third Party Advisory
https://security.gentoo.org/glsa/201702-18 Third Party Advisory
https://www.exploit-db.com/exploits/40679/ Exploit Third Party Advisory VDB Entry
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:percona:xtradb_cluster:*:*:*:*:*:*:*:*
cpe:2.3:a:percona:xtradb_cluster:*:*:*:*:*:*:*:*
cpe:2.3:a:percona:xtradb_cluster:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-12-13 21:59

Updated : 2025-04-12 10:46


NVD link : CVE-2016-6664

Mitre link : CVE-2016-6664

CVE.ORG link : CVE-2016-6664


JSON object : View

Products Affected

oracle

  • mysql

percona

  • xtradb_cluster
  • percona_server

mariadb

  • mariadb
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')