<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: MySQL Zero-Day Allows An Attacker To Take Full Control Of Database » TechWorm</title>
	<atom:link href="http://www.epanorama.net/blog/2016/09/14/mysql-zero-day-allows-an-attacker-to-take-full-control-of-database-techworm/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/09/14/mysql-zero-day-allows-an-attacker-to-take-full-control-of-database-techworm/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 05 Apr 2026 18:35:45 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/09/14/mysql-zero-day-allows-an-attacker-to-take-full-control-of-database-techworm/comment-page-1/#comment-1513093</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 14 Sep 2016 16:58:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=46935#comment-1513093</guid>
		<description><![CDATA[Bad news: MySQL can dish out root access to cunning miscreants
Good news: Oracle sneaked some patches out
http://www.theregister.co.uk/2016/09/13/mysql_security_bug/

Security holes in MySQL can be abused to gain remote root access on poorly configured servers, it emerged on Monday.

Patches to fix up the programming blunders were quietly released last week. The flaws are present in all default installations of MySQL 5.5, 5.6 and 5.7. Grab versions 5.5.52, 5.6.33 and 5.7.15 to avoid any trouble.

The bugs were discovered by Dawid Golunski, who says he reported them to MySQL overseer Oracle on July 29.

He found that you can misuse an SQL command to write arbitrary text to the open-source database&#039;s configuration files. He has published limited proof-of-concept code showing how to open a remote root shell on a vulnerable installation.

http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html]]></description>
		<content:encoded><![CDATA[<p>Bad news: MySQL can dish out root access to cunning miscreants<br />
Good news: Oracle sneaked some patches out<br />
<a href="http://www.theregister.co.uk/2016/09/13/mysql_security_bug/" rel="nofollow">http://www.theregister.co.uk/2016/09/13/mysql_security_bug/</a></p>
<p>Security holes in MySQL can be abused to gain remote root access on poorly configured servers, it emerged on Monday.</p>
<p>Patches to fix up the programming blunders were quietly released last week. The flaws are present in all default installations of MySQL 5.5, 5.6 and 5.7. Grab versions 5.5.52, 5.6.33 and 5.7.15 to avoid any trouble.</p>
<p>The bugs were discovered by Dawid Golunski, who says he reported them to MySQL overseer Oracle on July 29.</p>
<p>He found that you can misuse an SQL command to write arbitrary text to the open-source database&#8217;s configuration files. He has published limited proof-of-concept code showing how to open a remote root shell on a vulnerable installation.</p>
<p><a href="http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html" rel="nofollow">http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
