All the vulnerabilites related to mysql - mysql
cve-2007-5925
Vulnerability from cvelistv5
Published
2007-11-10 02:00
Modified
2024-08-07 15:47
Severity ?
Summary
The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.
References
http://secunia.com/advisories/27823third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://security.gentoo.org/glsa/glsa-200711-25.xmlvendor-advisory, x_refsource_GENTOO
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390vdb-entry, signature, x_refsource_OVAL
http://www.vupen.com/english/advisories/2007/3903vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/27649third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1018978vdb-entry, x_refsource_SECTRACK
https://usn.ubuntu.com/559-1/vendor-advisory, x_refsource_UBUNTU
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959vendor-advisory, x_refsource_SLACKWARE
http://www.debian.org/security/2007/dsa-1413vendor-advisory, x_refsource_DEBIAN
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/28040third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2007-1157.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/28099third-party-advisory, x_refsource_SECUNIA
http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.htmlmailing-list, x_refsource_FULLDISC
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/26353vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2007-1155.htmlvendor-advisory, x_refsource_REDHAT
http://bugs.gentoo.org/show_bug.cgi?id=198988x_refsource_CONFIRM
http://secunia.com/advisories/28108third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28025third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28838third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28128third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2007:243vendor-advisory, x_refsource_MANDRIVA
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.htmlvendor-advisory, x_refsource_SUSE
http://bugs.mysql.com/bug.php?id=32125x_refsource_CONFIRM
http://secunia.com/advisories/27568third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/38284vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:47:00.533Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "27823",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27823"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "GLSA-200711-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200711-25.xml"
          },
          {
            "name": "oval:org.mitre.oval:def:11390",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390"
          },
          {
            "name": "ADV-2007-3903",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3903"
          },
          {
            "name": "27649",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27649"
          },
          {
            "name": "1018978",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018978"
          },
          {
            "name": "USN-559-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/559-1/"
          },
          {
            "name": "SSA:2007-348-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959"
          },
          {
            "name": "DSA-1413",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1413"
          },
          {
            "name": "FEDORA-2007-4465",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html"
          },
          {
            "name": "28040",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28040"
          },
          {
            "name": "RHSA-2007:1157",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html"
          },
          {
            "name": "28099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28099"
          },
          {
            "name": "20071106 MySQL 5.x DoS (unknown)",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html"
          },
          {
            "name": "FEDORA-2007-4471",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
          },
          {
            "name": "26353",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26353"
          },
          {
            "name": "RHSA-2007:1155",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=198988"
          },
          {
            "name": "28108",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28108"
          },
          {
            "name": "28025",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28025"
          },
          {
            "name": "28838",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28838"
          },
          {
            "name": "28128",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28128"
          },
          {
            "name": "MDKSA-2007:243",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243"
          },
          {
            "name": "SUSE-SR:2008:003",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=32125"
          },
          {
            "name": "27568",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27568"
          },
          {
            "name": "mysql-hainnodb-dos(38284)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "27823",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27823"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "GLSA-200711-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200711-25.xml"
        },
        {
          "name": "oval:org.mitre.oval:def:11390",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390"
        },
        {
          "name": "ADV-2007-3903",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3903"
        },
        {
          "name": "27649",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27649"
        },
        {
          "name": "1018978",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018978"
        },
        {
          "name": "USN-559-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/559-1/"
        },
        {
          "name": "SSA:2007-348-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959"
        },
        {
          "name": "DSA-1413",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1413"
        },
        {
          "name": "FEDORA-2007-4465",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html"
        },
        {
          "name": "28040",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28040"
        },
        {
          "name": "RHSA-2007:1157",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html"
        },
        {
          "name": "28099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28099"
        },
        {
          "name": "20071106 MySQL 5.x DoS (unknown)",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html"
        },
        {
          "name": "FEDORA-2007-4471",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
        },
        {
          "name": "26353",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26353"
        },
        {
          "name": "RHSA-2007:1155",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=198988"
        },
        {
          "name": "28108",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28108"
        },
        {
          "name": "28025",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28025"
        },
        {
          "name": "28838",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28838"
        },
        {
          "name": "28128",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28128"
        },
        {
          "name": "MDKSA-2007:243",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243"
        },
        {
          "name": "SUSE-SR:2008:003",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=32125"
        },
        {
          "name": "27568",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27568"
        },
        {
          "name": "mysql-hainnodb-dos(38284)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-5925",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "27823",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27823"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "GLSA-200711-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200711-25.xml"
            },
            {
              "name": "oval:org.mitre.oval:def:11390",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390"
            },
            {
              "name": "ADV-2007-3903",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3903"
            },
            {
              "name": "27649",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27649"
            },
            {
              "name": "1018978",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018978"
            },
            {
              "name": "USN-559-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/559-1/"
            },
            {
              "name": "SSA:2007-348-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959"
            },
            {
              "name": "DSA-1413",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1413"
            },
            {
              "name": "FEDORA-2007-4465",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html"
            },
            {
              "name": "28040",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28040"
            },
            {
              "name": "RHSA-2007:1157",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html"
            },
            {
              "name": "28099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28099"
            },
            {
              "name": "20071106 MySQL 5.x DoS (unknown)",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html"
            },
            {
              "name": "FEDORA-2007-4471",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
            },
            {
              "name": "26353",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26353"
            },
            {
              "name": "RHSA-2007:1155",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=198988",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=198988"
            },
            {
              "name": "28108",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28108"
            },
            {
              "name": "28025",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28025"
            },
            {
              "name": "28838",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28838"
            },
            {
              "name": "28128",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28128"
            },
            {
              "name": "MDKSA-2007:243",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243"
            },
            {
              "name": "SUSE-SR:2008:003",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=32125",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=32125"
            },
            {
              "name": "27568",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27568"
            },
            {
              "name": "mysql-hainnodb-dos(38284)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-5925",
    "datePublished": "2007-11-10T02:00:00",
    "dateReserved": "2007-11-09T00:00:00",
    "dateUpdated": "2024-08-07T15:47:00.533Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3679
Vulnerability from cvelistv5
Published
2011-01-11 19:00
Modified
2024-08-07 03:18
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via certain arguments to the BINLOG command, which triggers an access of uninitialized memory, as demonstrated by valgrind.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:18:52.968Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "mysql-binlog-command-dos(64687)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64687"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "MDVSA-2011:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "name": "42638",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42638"
          },
          {
            "name": "ADV-2011-0133",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0133"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=54393"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
          },
          {
            "name": "MDVSA-2010:155",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628062"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via certain arguments to the BINLOG command, which triggers an access of uninitialized memory, as demonstrated by valgrind."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "mysql-binlog-command-dos(64687)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64687"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "MDVSA-2011:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "name": "42638",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42638"
        },
        {
          "name": "ADV-2011-0133",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0133"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=54393"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
        },
        {
          "name": "MDVSA-2010:155",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628062"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3679",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via certain arguments to the BINLOG command, which triggers an access of uninitialized memory, as demonstrated by valgrind."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "mysql-binlog-command-dos(64687)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64687"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "MDVSA-2011:012",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "42638",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42638"
            },
            {
              "name": "ADV-2011-0133",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0133"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=54393",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=54393"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
            },
            {
              "name": "MDVSA-2010:155",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628062",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628062"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3679",
    "datePublished": "2011-01-11T19:00:00",
    "dateReserved": "2010-09-28T00:00:00",
    "dateUpdated": "2024-08-07T03:18:52.968Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-0226
Vulnerability from cvelistv5
Published
2008-01-10 23:00
Modified
2024-08-07 07:39
Severity ?
Summary
Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.
References
http://www.debian.org/security/2008/dsa-1478vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/29443third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/485810/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/28324third-party-advisory, x_refsource_SECUNIA
http://securityreason.com/securityalert/3531third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/bid/31681vdb-entry, x_refsource_BID
http://bugs.mysql.com/33814x_refsource_CONFIRM
http://www.securityfocus.com/bid/27140vdb-entry, x_refsource_BID
http://secunia.com/advisories/28597third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0560/referencesvdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/32222third-party-advisory, x_refsource_SECUNIA
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.htmlx_refsource_CONFIRM
http://www.securityfocus.com/archive/1/485811/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/28419third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2780vdb-entry, x_refsource_VUPEN
http://www.ubuntu.com/usn/usn-588-1vendor-advisory, x_refsource_UBUNTU
http://www.mandriva.com/security/advisories?name=MDVSA-2008:150vendor-advisory, x_refsource_MANDRIVA
https://exchange.xforce.ibmcloud.com/vulnerabilities/39431vdb-entry, x_refsource_XF
https://exchange.xforce.ibmcloud.com/vulnerabilities/39429vdb-entry, x_refsource_XF
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlvendor-advisory, x_refsource_APPLE
http://support.apple.com/kb/HT3216x_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:39:35.055Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-1478",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1478"
          },
          {
            "name": "29443",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29443"
          },
          {
            "name": "20080104 Multiple vulnerabilities in yaSSL 1.7.5",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/485810/100/0/threaded"
          },
          {
            "name": "28324",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28324"
          },
          {
            "name": "3531",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3531"
          },
          {
            "name": "31681",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31681"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/33814"
          },
          {
            "name": "27140",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27140"
          },
          {
            "name": "28597",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28597"
          },
          {
            "name": "ADV-2008-0560",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0560/references"
          },
          {
            "name": "32222",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32222"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
          },
          {
            "name": "20080104 Pre-auth buffer-overflow in mySQL through yaSSL",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/485811/100/0/threaded"
          },
          {
            "name": "28419",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28419"
          },
          {
            "name": "ADV-2008-2780",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2780"
          },
          {
            "name": "USN-588-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-588-1"
          },
          {
            "name": "MDVSA-2008:150",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150"
          },
          {
            "name": "yassl-inputbufferoperator-bo(39431)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431"
          },
          {
            "name": "yassl-processoldclienthello-bo(39429)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429"
          },
          {
            "name": "APPLE-SA-2008-10-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3216"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-01-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) \"input_buffer\u0026 operator\u003e\u003e\" in yassl_imp.cpp."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-1478",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1478"
        },
        {
          "name": "29443",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29443"
        },
        {
          "name": "20080104 Multiple vulnerabilities in yaSSL 1.7.5",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/485810/100/0/threaded"
        },
        {
          "name": "28324",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28324"
        },
        {
          "name": "3531",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3531"
        },
        {
          "name": "31681",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31681"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/33814"
        },
        {
          "name": "27140",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27140"
        },
        {
          "name": "28597",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28597"
        },
        {
          "name": "ADV-2008-0560",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0560/references"
        },
        {
          "name": "32222",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32222"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
        },
        {
          "name": "20080104 Pre-auth buffer-overflow in mySQL through yaSSL",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/485811/100/0/threaded"
        },
        {
          "name": "28419",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28419"
        },
        {
          "name": "ADV-2008-2780",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2780"
        },
        {
          "name": "USN-588-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-588-1"
        },
        {
          "name": "MDVSA-2008:150",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150"
        },
        {
          "name": "yassl-inputbufferoperator-bo(39431)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431"
        },
        {
          "name": "yassl-processoldclienthello-bo(39429)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429"
        },
        {
          "name": "APPLE-SA-2008-10-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3216"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0226",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) \"input_buffer\u0026 operator\u003e\u003e\" in yassl_imp.cpp."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-1478",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1478"
            },
            {
              "name": "29443",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29443"
            },
            {
              "name": "20080104 Multiple vulnerabilities in yaSSL 1.7.5",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/485810/100/0/threaded"
            },
            {
              "name": "28324",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28324"
            },
            {
              "name": "3531",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3531"
            },
            {
              "name": "31681",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31681"
            },
            {
              "name": "http://bugs.mysql.com/33814",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/33814"
            },
            {
              "name": "27140",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27140"
            },
            {
              "name": "28597",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28597"
            },
            {
              "name": "ADV-2008-0560",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0560/references"
            },
            {
              "name": "32222",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32222"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
            },
            {
              "name": "20080104 Pre-auth buffer-overflow in mySQL through yaSSL",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/485811/100/0/threaded"
            },
            {
              "name": "28419",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28419"
            },
            {
              "name": "ADV-2008-2780",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2780"
            },
            {
              "name": "USN-588-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-588-1"
            },
            {
              "name": "MDVSA-2008:150",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150"
            },
            {
              "name": "yassl-inputbufferoperator-bo(39431)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431"
            },
            {
              "name": "yassl-processoldclienthello-bo(39429)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429"
            },
            {
              "name": "APPLE-SA-2008-10-09",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
            },
            {
              "name": "http://support.apple.com/kb/HT3216",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3216"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0226",
    "datePublished": "2008-01-10T23:00:00",
    "dateReserved": "2008-01-10T00:00:00",
    "dateUpdated": "2024-08-07T07:39:35.055Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0112
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:16
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.701Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0112",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0112",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-12-12T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.701Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-3081
Vulnerability from cvelistv5
Published
2006-06-19 18:00
Modified
2024-08-07 18:16
Severity ?
Summary
mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/27212vdb-entry, x_refsource_XF
http://secunia.com/advisories/19929third-party-advisory, x_refsource_SECUNIA
http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlthird-party-advisory, x_refsource_CERT
http://seclists.org/lists/fulldisclosure/2006/Jun/0434.htmlmailing-list, x_refsource_FULLDISC
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913x_refsource_CONFIRM
http://www.us-cert.gov/cas/techalerts/TA06-208A.htmlthird-party-advisory, x_refsource_CERT
http://secunia.com/advisories/20832third-party-advisory, x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlvendor-advisory, x_refsource_APPLE
http://www.securityfocus.com/archive/1/437145mailing-list, x_refsource_BUGTRAQ
http://docs.info.apple.com/article.html?artnum=305214x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDKSA-2006:111vendor-advisory, x_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/437277mailing-list, x_refsource_BUGTRAQ
http://www.debian.org/security/2006/dsa-1112vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/18439vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2007/0930vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/20871third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2007-0083.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/archive/1/437571/100/0/threadedmailing-list, x_refsource_BUGTRAQ
https://usn.ubuntu.com/306-1/vendor-advisory, x_refsource_UBUNTU
http://bugs.mysql.com/bug.php?id=15828x_refsource_CONFIRM
http://secunia.com/advisories/24479third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516vdb-entry, signature, x_refsource_OVAL
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:16:05.934Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mysql-select-dos(27212)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212"
          },
          {
            "name": "19929",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19929"
          },
          {
            "name": "TA07-072A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
          },
          {
            "name": "20060615 MySQL DoS",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913"
          },
          {
            "name": "TA06-208A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
          },
          {
            "name": "20832",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20832"
          },
          {
            "name": "APPLE-SA-2007-03-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
          },
          {
            "name": "20060614 MySQL DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/437145"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=305214"
          },
          {
            "name": "MDKSA-2006:111",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111"
          },
          {
            "name": "20060615 Re: MySQL DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/437277"
          },
          {
            "name": "DSA-1112",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1112"
          },
          {
            "name": "18439",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18439"
          },
          {
            "name": "ADV-2007-0930",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0930"
          },
          {
            "name": "20871",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20871"
          },
          {
            "name": "RHSA-2007:0083",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
          },
          {
            "name": "20060615 Re: MySQL DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded"
          },
          {
            "name": "USN-306-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/306-1/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=15828"
          },
          {
            "name": "24479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24479"
          },
          {
            "name": "oval:org.mitre.oval:def:9516",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "mysql-select-dos(27212)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212"
        },
        {
          "name": "19929",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19929"
        },
        {
          "name": "TA07-072A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
        },
        {
          "name": "20060615 MySQL DoS",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913"
        },
        {
          "name": "TA06-208A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
        },
        {
          "name": "20832",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20832"
        },
        {
          "name": "APPLE-SA-2007-03-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
        },
        {
          "name": "20060614 MySQL DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/437145"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=305214"
        },
        {
          "name": "MDKSA-2006:111",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111"
        },
        {
          "name": "20060615 Re: MySQL DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/437277"
        },
        {
          "name": "DSA-1112",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1112"
        },
        {
          "name": "18439",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18439"
        },
        {
          "name": "ADV-2007-0930",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0930"
        },
        {
          "name": "20871",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20871"
        },
        {
          "name": "RHSA-2007:0083",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
        },
        {
          "name": "20060615 Re: MySQL DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded"
        },
        {
          "name": "USN-306-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/306-1/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=15828"
        },
        {
          "name": "24479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24479"
        },
        {
          "name": "oval:org.mitre.oval:def:9516",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3081",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mysql-select-dos(27212)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212"
            },
            {
              "name": "19929",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19929"
            },
            {
              "name": "TA07-072A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
            },
            {
              "name": "20060615 MySQL DoS",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913"
            },
            {
              "name": "TA06-208A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
            },
            {
              "name": "20832",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20832"
            },
            {
              "name": "APPLE-SA-2007-03-13",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
            },
            {
              "name": "20060614 MySQL DoS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/437145"
            },
            {
              "name": "http://docs.info.apple.com/article.html?artnum=305214",
              "refsource": "CONFIRM",
              "url": "http://docs.info.apple.com/article.html?artnum=305214"
            },
            {
              "name": "MDKSA-2006:111",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111"
            },
            {
              "name": "20060615 Re: MySQL DoS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/437277"
            },
            {
              "name": "DSA-1112",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1112"
            },
            {
              "name": "18439",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18439"
            },
            {
              "name": "ADV-2007-0930",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0930"
            },
            {
              "name": "20871",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20871"
            },
            {
              "name": "RHSA-2007:0083",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
            },
            {
              "name": "20060615 Re: MySQL DoS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded"
            },
            {
              "name": "USN-306-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/306-1/"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=15828",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=15828"
            },
            {
              "name": "24479",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24479"
            },
            {
              "name": "oval:org.mitre.oval:def:9516",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3081",
    "datePublished": "2006-06-19T18:00:00",
    "dateReserved": "2006-06-19T00:00:00",
    "dateUpdated": "2024-08-07T18:16:05.934Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-1517
Vulnerability from cvelistv5
Published
2006-05-05 10:00
Modified
2024-08-07 17:12
Severity ?
Summary
sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
References
http://www.securityfocus.com/archive/1/432734/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.trustix.org/errata/2006/0028vendor-advisory, x_refsource_TRUSTIX
http://secunia.com/advisories/19929third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20073third-party-advisory, x_refsource_SECUNIA
http://www.wisec.it/vulns.php?page=8x_refsource_MISC
http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlthird-party-advisory, x_refsource_CERT
http://www.debian.org/security/2006/dsa-1079vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2006/1633vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/434164/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/20424third-party-advisory, x_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-200605-13.xmlvendor-advisory, x_refsource_GENTOO
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlvendor-advisory, x_refsource_APPLE
http://docs.info.apple.com/article.html?artnum=305214x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036vdb-entry, signature, x_refsource_OVAL
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.htmlvendor-advisory, x_refsource_SUSE
http://securityreason.com/securityalert/839third-party-advisory, x_refsource_SREASON
http://www.osvdb.org/25228vdb-entry, x_refsource_OSVDB
http://www.novell.com/linux/security/advisories/2006-06-02.htmlvendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/bid/17780vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDKSA-2006:084vendor-advisory, x_refsource_MANDRIVA
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.htmlx_refsource_CONFIRM
http://secunia.com/advisories/20241third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20762third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1vendor-advisory, x_refsource_SUNALERT
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377vendor-advisory, x_refsource_SLACKWARE
http://secunia.com/advisories/20333third-party-advisory, x_refsource_SECUNIA
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939x_refsource_CONFIRM
http://secunia.com/advisories/20002third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20223third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20076third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1016016vdb-entry, x_refsource_SECTRACK
http://www.debian.org/security/2006/dsa-1071vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/1326/referencesvdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/0930vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/20253third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/283-1/vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/20457third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1073vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/26228vdb-entry, x_refsource_XF
http://secunia.com/advisories/29847third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20625third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-0544.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/24479third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:12:22.483Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution.",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded"
          },
          {
            "name": "2006-0028",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0028"
          },
          {
            "name": "19929",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19929"
          },
          {
            "name": "20073",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20073"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.wisec.it/vulns.php?page=8"
          },
          {
            "name": "TA07-072A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
          },
          {
            "name": "DSA-1079",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1079"
          },
          {
            "name": "ADV-2006-1633",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1633"
          },
          {
            "name": "20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded"
          },
          {
            "name": "20424",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20424"
          },
          {
            "name": "GLSA-200605-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml"
          },
          {
            "name": "APPLE-SA-2007-03-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=305214"
          },
          {
            "name": "oval:org.mitre.oval:def:11036",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036"
          },
          {
            "name": "SUSE-SA:2006:036",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
          },
          {
            "name": "839",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/839"
          },
          {
            "name": "25228",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/25228"
          },
          {
            "name": "SUSE-SR:2006:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
          },
          {
            "name": "17780",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17780"
          },
          {
            "name": "MDKSA-2006:084",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
          },
          {
            "name": "20241",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20241"
          },
          {
            "name": "20762",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20762"
          },
          {
            "name": "236703",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
          },
          {
            "name": "SSA:2006-155-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377"
          },
          {
            "name": "20333",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20333"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939"
          },
          {
            "name": "20002",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20002"
          },
          {
            "name": "20223",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20223"
          },
          {
            "name": "20076",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20076"
          },
          {
            "name": "1016016",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016016"
          },
          {
            "name": "DSA-1071",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1071"
          },
          {
            "name": "ADV-2008-1326",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1326/references"
          },
          {
            "name": "ADV-2007-0930",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0930"
          },
          {
            "name": "20253",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20253"
          },
          {
            "name": "USN-283-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/283-1/"
          },
          {
            "name": "20457",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20457"
          },
          {
            "name": "DSA-1073",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1073"
          },
          {
            "name": "mysql-sqlparcecc-information-disclosure(26228)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26228"
          },
          {
            "name": "29847",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29847"
          },
          {
            "name": "20625",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20625"
          },
          {
            "name": "RHSA-2006:0544",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
          },
          {
            "name": "24479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24479"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
        "shortName": "debian"
      },
      "references": [
        {
          "name": "20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution.",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded"
        },
        {
          "name": "2006-0028",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0028"
        },
        {
          "name": "19929",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19929"
        },
        {
          "name": "20073",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20073"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.wisec.it/vulns.php?page=8"
        },
        {
          "name": "TA07-072A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
        },
        {
          "name": "DSA-1079",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1079"
        },
        {
          "name": "ADV-2006-1633",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1633"
        },
        {
          "name": "20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded"
        },
        {
          "name": "20424",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20424"
        },
        {
          "name": "GLSA-200605-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml"
        },
        {
          "name": "APPLE-SA-2007-03-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=305214"
        },
        {
          "name": "oval:org.mitre.oval:def:11036",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036"
        },
        {
          "name": "SUSE-SA:2006:036",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
        },
        {
          "name": "839",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/839"
        },
        {
          "name": "25228",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/25228"
        },
        {
          "name": "SUSE-SR:2006:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
        },
        {
          "name": "17780",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17780"
        },
        {
          "name": "MDKSA-2006:084",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
        },
        {
          "name": "20241",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20241"
        },
        {
          "name": "20762",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20762"
        },
        {
          "name": "236703",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
        },
        {
          "name": "SSA:2006-155-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377"
        },
        {
          "name": "20333",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20333"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939"
        },
        {
          "name": "20002",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20002"
        },
        {
          "name": "20223",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20223"
        },
        {
          "name": "20076",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20076"
        },
        {
          "name": "1016016",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016016"
        },
        {
          "name": "DSA-1071",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1071"
        },
        {
          "name": "ADV-2008-1326",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1326/references"
        },
        {
          "name": "ADV-2007-0930",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0930"
        },
        {
          "name": "20253",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20253"
        },
        {
          "name": "USN-283-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/283-1/"
        },
        {
          "name": "20457",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20457"
        },
        {
          "name": "DSA-1073",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1073"
        },
        {
          "name": "mysql-sqlparcecc-information-disclosure(26228)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26228"
        },
        {
          "name": "29847",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29847"
        },
        {
          "name": "20625",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20625"
        },
        {
          "name": "RHSA-2006:0544",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
        },
        {
          "name": "24479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24479"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@debian.org",
          "ID": "CVE-2006-1517",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution.",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded"
            },
            {
              "name": "2006-0028",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0028"
            },
            {
              "name": "19929",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19929"
            },
            {
              "name": "20073",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20073"
            },
            {
              "name": "http://www.wisec.it/vulns.php?page=8",
              "refsource": "MISC",
              "url": "http://www.wisec.it/vulns.php?page=8"
            },
            {
              "name": "TA07-072A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
            },
            {
              "name": "DSA-1079",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1079"
            },
            {
              "name": "ADV-2006-1633",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1633"
            },
            {
              "name": "20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded"
            },
            {
              "name": "20424",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20424"
            },
            {
              "name": "GLSA-200605-13",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml"
            },
            {
              "name": "APPLE-SA-2007-03-13",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
            },
            {
              "name": "http://docs.info.apple.com/article.html?artnum=305214",
              "refsource": "CONFIRM",
              "url": "http://docs.info.apple.com/article.html?artnum=305214"
            },
            {
              "name": "oval:org.mitre.oval:def:11036",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036"
            },
            {
              "name": "SUSE-SA:2006:036",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
            },
            {
              "name": "839",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/839"
            },
            {
              "name": "25228",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/25228"
            },
            {
              "name": "SUSE-SR:2006:012",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
            },
            {
              "name": "17780",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17780"
            },
            {
              "name": "MDKSA-2006:084",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
            },
            {
              "name": "20241",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20241"
            },
            {
              "name": "20762",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20762"
            },
            {
              "name": "236703",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
            },
            {
              "name": "SSA:2006-155-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377"
            },
            {
              "name": "20333",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20333"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939"
            },
            {
              "name": "20002",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20002"
            },
            {
              "name": "20223",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20223"
            },
            {
              "name": "20076",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20076"
            },
            {
              "name": "1016016",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016016"
            },
            {
              "name": "DSA-1071",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1071"
            },
            {
              "name": "ADV-2008-1326",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1326/references"
            },
            {
              "name": "ADV-2007-0930",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0930"
            },
            {
              "name": "20253",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20253"
            },
            {
              "name": "USN-283-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/283-1/"
            },
            {
              "name": "20457",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20457"
            },
            {
              "name": "DSA-1073",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1073"
            },
            {
              "name": "mysql-sqlparcecc-information-disclosure(26228)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26228"
            },
            {
              "name": "29847",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29847"
            },
            {
              "name": "20625",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20625"
            },
            {
              "name": "RHSA-2006:0544",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
            },
            {
              "name": "24479",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24479"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
    "assignerShortName": "debian",
    "cveId": "CVE-2006-1517",
    "datePublished": "2006-05-05T10:00:00",
    "dateReserved": "2006-03-30T00:00:00",
    "dateUpdated": "2024-08-07T17:12:22.483Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0116
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:16
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.554Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0116",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0116",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-12-12T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.554Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-1516
Vulnerability from cvelistv5
Published
2006-05-05 10:00
Modified
2024-08-07 17:12
Severity ?
Summary
The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
References
http://www.trustix.org/errata/2006/0028vendor-advisory, x_refsource_TRUSTIX
http://secunia.com/advisories/19929third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20073third-party-advisory, x_refsource_SECUNIA
http://bugs.debian.org/365938x_refsource_CONFIRM
http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlthird-party-advisory, x_refsource_CERT
http://www.debian.org/security/2006/dsa-1079vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2006/1633vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/434164/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/20424third-party-advisory, x_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-200605-13.xmlvendor-advisory, x_refsource_GENTOO
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlvendor-advisory, x_refsource_APPLE
http://securityreason.com/securityalert/840third-party-advisory, x_refsource_SREASON
http://docs.info.apple.com/article.html?artnum=305214x_refsource_CONFIRM
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.htmlvendor-advisory, x_refsource_SUSE
http://www.novell.com/linux/security/advisories/2006-06-02.htmlvendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/bid/17780vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDKSA-2006:084vendor-advisory, x_refsource_MANDRIVA
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.htmlx_refsource_CONFIRM
http://secunia.com/advisories/20241third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20762third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26236vdb-entry, x_refsource_XF
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1vendor-advisory, x_refsource_SUNALERT
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377vendor-advisory, x_refsource_SLACKWARE
http://secunia.com/advisories/20333third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1016017vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/20002third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20223third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20076third-party-advisory, x_refsource_SECUNIA
http://www.wisec.it/vulns.php?page=7x_refsource_MISC
http://www.debian.org/security/2006/dsa-1071vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/1326/referencesvdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/0930vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/432733/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/20253third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/283-1/vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/20457third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1073vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/29847third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20625third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-0544.htmlvendor-advisory, x_refsource_REDHAT
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/24479third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:12:22.153Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2006-0028",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0028"
          },
          {
            "name": "19929",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19929"
          },
          {
            "name": "20073",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20073"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/365938"
          },
          {
            "name": "TA07-072A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
          },
          {
            "name": "DSA-1079",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1079"
          },
          {
            "name": "ADV-2006-1633",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1633"
          },
          {
            "name": "20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded"
          },
          {
            "name": "20424",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20424"
          },
          {
            "name": "GLSA-200605-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml"
          },
          {
            "name": "APPLE-SA-2007-03-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
          },
          {
            "name": "840",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/840"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=305214"
          },
          {
            "name": "SUSE-SA:2006:036",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
          },
          {
            "name": "SUSE-SR:2006:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
          },
          {
            "name": "17780",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17780"
          },
          {
            "name": "MDKSA-2006:084",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
          },
          {
            "name": "20241",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20241"
          },
          {
            "name": "20762",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20762"
          },
          {
            "name": "mysql-login-packet-info-disclosure(26236)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26236"
          },
          {
            "name": "236703",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
          },
          {
            "name": "SSA:2006-155-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377"
          },
          {
            "name": "20333",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20333"
          },
          {
            "name": "1016017",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016017"
          },
          {
            "name": "20002",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20002"
          },
          {
            "name": "20223",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20223"
          },
          {
            "name": "20076",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20076"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.wisec.it/vulns.php?page=7"
          },
          {
            "name": "DSA-1071",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1071"
          },
          {
            "name": "ADV-2008-1326",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1326/references"
          },
          {
            "name": "ADV-2007-0930",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0930"
          },
          {
            "name": "20060502 MySQL Anonymous Login Handshake - Information Leakage.",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/432733/100/0/threaded"
          },
          {
            "name": "20253",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20253"
          },
          {
            "name": "USN-283-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/283-1/"
          },
          {
            "name": "20457",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20457"
          },
          {
            "name": "DSA-1073",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1073"
          },
          {
            "name": "29847",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29847"
          },
          {
            "name": "20625",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20625"
          },
          {
            "name": "RHSA-2006:0544",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
          },
          {
            "name": "oval:org.mitre.oval:def:9918",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918"
          },
          {
            "name": "24479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24479"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
        "shortName": "debian"
      },
      "references": [
        {
          "name": "2006-0028",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0028"
        },
        {
          "name": "19929",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19929"
        },
        {
          "name": "20073",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20073"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/365938"
        },
        {
          "name": "TA07-072A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
        },
        {
          "name": "DSA-1079",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1079"
        },
        {
          "name": "ADV-2006-1633",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1633"
        },
        {
          "name": "20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded"
        },
        {
          "name": "20424",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20424"
        },
        {
          "name": "GLSA-200605-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml"
        },
        {
          "name": "APPLE-SA-2007-03-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
        },
        {
          "name": "840",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/840"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=305214"
        },
        {
          "name": "SUSE-SA:2006:036",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
        },
        {
          "name": "SUSE-SR:2006:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
        },
        {
          "name": "17780",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17780"
        },
        {
          "name": "MDKSA-2006:084",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
        },
        {
          "name": "20241",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20241"
        },
        {
          "name": "20762",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20762"
        },
        {
          "name": "mysql-login-packet-info-disclosure(26236)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26236"
        },
        {
          "name": "236703",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
        },
        {
          "name": "SSA:2006-155-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377"
        },
        {
          "name": "20333",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20333"
        },
        {
          "name": "1016017",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016017"
        },
        {
          "name": "20002",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20002"
        },
        {
          "name": "20223",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20223"
        },
        {
          "name": "20076",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20076"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.wisec.it/vulns.php?page=7"
        },
        {
          "name": "DSA-1071",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1071"
        },
        {
          "name": "ADV-2008-1326",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1326/references"
        },
        {
          "name": "ADV-2007-0930",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0930"
        },
        {
          "name": "20060502 MySQL Anonymous Login Handshake - Information Leakage.",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/432733/100/0/threaded"
        },
        {
          "name": "20253",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20253"
        },
        {
          "name": "USN-283-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/283-1/"
        },
        {
          "name": "20457",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20457"
        },
        {
          "name": "DSA-1073",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1073"
        },
        {
          "name": "29847",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29847"
        },
        {
          "name": "20625",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20625"
        },
        {
          "name": "RHSA-2006:0544",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
        },
        {
          "name": "oval:org.mitre.oval:def:9918",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918"
        },
        {
          "name": "24479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24479"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@debian.org",
          "ID": "CVE-2006-1516",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2006-0028",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0028"
            },
            {
              "name": "19929",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19929"
            },
            {
              "name": "20073",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20073"
            },
            {
              "name": "http://bugs.debian.org/365938",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/365938"
            },
            {
              "name": "TA07-072A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
            },
            {
              "name": "DSA-1079",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1079"
            },
            {
              "name": "ADV-2006-1633",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1633"
            },
            {
              "name": "20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded"
            },
            {
              "name": "20424",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20424"
            },
            {
              "name": "GLSA-200605-13",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml"
            },
            {
              "name": "APPLE-SA-2007-03-13",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
            },
            {
              "name": "840",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/840"
            },
            {
              "name": "http://docs.info.apple.com/article.html?artnum=305214",
              "refsource": "CONFIRM",
              "url": "http://docs.info.apple.com/article.html?artnum=305214"
            },
            {
              "name": "SUSE-SA:2006:036",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
            },
            {
              "name": "SUSE-SR:2006:012",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
            },
            {
              "name": "17780",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17780"
            },
            {
              "name": "MDKSA-2006:084",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
            },
            {
              "name": "20241",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20241"
            },
            {
              "name": "20762",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20762"
            },
            {
              "name": "mysql-login-packet-info-disclosure(26236)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26236"
            },
            {
              "name": "236703",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
            },
            {
              "name": "SSA:2006-155-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377"
            },
            {
              "name": "20333",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20333"
            },
            {
              "name": "1016017",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016017"
            },
            {
              "name": "20002",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20002"
            },
            {
              "name": "20223",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20223"
            },
            {
              "name": "20076",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20076"
            },
            {
              "name": "http://www.wisec.it/vulns.php?page=7",
              "refsource": "MISC",
              "url": "http://www.wisec.it/vulns.php?page=7"
            },
            {
              "name": "DSA-1071",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1071"
            },
            {
              "name": "ADV-2008-1326",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1326/references"
            },
            {
              "name": "ADV-2007-0930",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0930"
            },
            {
              "name": "20060502 MySQL Anonymous Login Handshake - Information Leakage.",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/432733/100/0/threaded"
            },
            {
              "name": "20253",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20253"
            },
            {
              "name": "USN-283-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/283-1/"
            },
            {
              "name": "20457",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20457"
            },
            {
              "name": "DSA-1073",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1073"
            },
            {
              "name": "29847",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29847"
            },
            {
              "name": "20625",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20625"
            },
            {
              "name": "RHSA-2006:0544",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
            },
            {
              "name": "oval:org.mitre.oval:def:9918",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918"
            },
            {
              "name": "24479",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24479"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
    "assignerShortName": "debian",
    "cveId": "CVE-2006-1516",
    "datePublished": "2006-05-05T10:00:00",
    "dateReserved": "2006-03-30T00:00:00",
    "dateUpdated": "2024-08-07T17:12:22.153Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-4031
Vulnerability from cvelistv5
Published
2006-08-09 22:00
Modified
2024-08-07 18:57
Severity ?
Summary
MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy.
References
http://secunia.com/advisories/21259third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/21627third-party-advisory, x_refsource_SECUNIA
http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlthird-party-advisory, x_refsource_CERT
http://www.novell.com/linux/security/advisories/2006_23_sr.htmlvendor-advisory, x_refsource_SUSE
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlvendor-advisory, x_refsource_APPLE
http://www.vupen.com/english/advisories/2006/3079vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/19279vdb-entry, x_refsource_BID
http://www.ubuntu.com/usn/usn-338-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/31226third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468vdb-entry, signature, x_refsource_OVAL
http://docs.info.apple.com/article.html?artnum=305214x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2008-0768.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/21382third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:149vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/22080third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/21770third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/21685third-party-advisory, x_refsource_SECUNIA
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.htmlx_refsource_CONFIRM
http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.htmlx_refsource_CONFIRM
http://securitytracker.com/id?1016617vdb-entry, x_refsource_SECTRACK
http://bugs.mysql.com/bug.php?id=15195x_refsource_MISC
http://secunia.com/advisories/30351third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/0930vdb-entry, x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2007-0083.htmlvendor-advisory, x_refsource_REDHAT
https://issues.rpath.com/browse/RPL-568x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2008-0364.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/24479third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:57:46.100Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "21259",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21259"
          },
          {
            "name": "21627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21627"
          },
          {
            "name": "TA07-072A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
          },
          {
            "name": "SUSE-SR:2006:023",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
          },
          {
            "name": "APPLE-SA-2007-03-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
          },
          {
            "name": "ADV-2006-3079",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3079"
          },
          {
            "name": "19279",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19279"
          },
          {
            "name": "USN-338-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-338-1"
          },
          {
            "name": "31226",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31226"
          },
          {
            "name": "oval:org.mitre.oval:def:10468",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=305214"
          },
          {
            "name": "RHSA-2008:0768",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
          },
          {
            "name": "21382",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21382"
          },
          {
            "name": "MDKSA-2006:149",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
          },
          {
            "name": "22080",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22080"
          },
          {
            "name": "21770",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21770"
          },
          {
            "name": "21685",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21685"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html"
          },
          {
            "name": "1016617",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016617"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=15195"
          },
          {
            "name": "30351",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30351"
          },
          {
            "name": "ADV-2007-0930",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0930"
          },
          {
            "name": "RHSA-2007:0083",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-568"
          },
          {
            "name": "RHSA-2008:0364",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
          },
          {
            "name": "24479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24479"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "21259",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21259"
        },
        {
          "name": "21627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21627"
        },
        {
          "name": "TA07-072A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
        },
        {
          "name": "SUSE-SR:2006:023",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
        },
        {
          "name": "APPLE-SA-2007-03-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
        },
        {
          "name": "ADV-2006-3079",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3079"
        },
        {
          "name": "19279",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19279"
        },
        {
          "name": "USN-338-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-338-1"
        },
        {
          "name": "31226",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31226"
        },
        {
          "name": "oval:org.mitre.oval:def:10468",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=305214"
        },
        {
          "name": "RHSA-2008:0768",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
        },
        {
          "name": "21382",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21382"
        },
        {
          "name": "MDKSA-2006:149",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
        },
        {
          "name": "22080",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22080"
        },
        {
          "name": "21770",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21770"
        },
        {
          "name": "21685",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21685"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html"
        },
        {
          "name": "1016617",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016617"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=15195"
        },
        {
          "name": "30351",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30351"
        },
        {
          "name": "ADV-2007-0930",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0930"
        },
        {
          "name": "RHSA-2007:0083",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-568"
        },
        {
          "name": "RHSA-2008:0364",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
        },
        {
          "name": "24479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24479"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4031",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "21259",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21259"
            },
            {
              "name": "21627",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21627"
            },
            {
              "name": "TA07-072A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
            },
            {
              "name": "SUSE-SR:2006:023",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
            },
            {
              "name": "APPLE-SA-2007-03-13",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
            },
            {
              "name": "ADV-2006-3079",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3079"
            },
            {
              "name": "19279",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19279"
            },
            {
              "name": "USN-338-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-338-1"
            },
            {
              "name": "31226",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31226"
            },
            {
              "name": "oval:org.mitre.oval:def:10468",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468"
            },
            {
              "name": "http://docs.info.apple.com/article.html?artnum=305214",
              "refsource": "CONFIRM",
              "url": "http://docs.info.apple.com/article.html?artnum=305214"
            },
            {
              "name": "RHSA-2008:0768",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
            },
            {
              "name": "21382",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21382"
            },
            {
              "name": "MDKSA-2006:149",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
            },
            {
              "name": "22080",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22080"
            },
            {
              "name": "21770",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21770"
            },
            {
              "name": "21685",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21685"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html"
            },
            {
              "name": "1016617",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016617"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=15195",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=15195"
            },
            {
              "name": "30351",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30351"
            },
            {
              "name": "ADV-2007-0930",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0930"
            },
            {
              "name": "RHSA-2007:0083",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-568",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-568"
            },
            {
              "name": "RHSA-2008:0364",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
            },
            {
              "name": "24479",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24479"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4031",
    "datePublished": "2006-08-09T22:00:00",
    "dateReserved": "2006-08-09T00:00:00",
    "dateUpdated": "2024-08-07T18:57:46.100Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-4380
Vulnerability from cvelistv5
Published
2006-08-28 18:00
Modified
2024-08-07 19:06
Severity ?
Summary
MySQL before 4.1.13 allows local users to cause a denial of service (persistent replication slave crash) via a query with multiupdate and subselects.
References
http://www.mandriva.com/security/advisories?name=MDKSA-2006:158vendor-advisory, x_refsource_MANDRIVA
http://bugs.mysql.com/10442x_refsource_CONFIRM
http://secunia.com/advisories/21712third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/21762third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/19794vdb-entry, x_refsource_BID
http://lists.mysql.com/internals/26123x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10686vdb-entry, signature, x_refsource_OVAL
http://www.debian.org/security/2006/dsa-1169vendor-advisory, x_refsource_DEBIAN
http://securitytracker.com/id?1016790vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:07.628Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDKSA-2006:158",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:158"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/10442"
          },
          {
            "name": "21712",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21712"
          },
          {
            "name": "21762",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21762"
          },
          {
            "name": "19794",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19794"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/internals/26123"
          },
          {
            "name": "oval:org.mitre.oval:def:10686",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10686"
          },
          {
            "name": "DSA-1169",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1169"
          },
          {
            "name": "1016790",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016790"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL before 4.1.13 allows local users to cause a denial of service (persistent replication slave crash) via a query with multiupdate and subselects."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MDKSA-2006:158",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:158"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/10442"
        },
        {
          "name": "21712",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21712"
        },
        {
          "name": "21762",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21762"
        },
        {
          "name": "19794",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19794"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://lists.mysql.com/internals/26123"
        },
        {
          "name": "oval:org.mitre.oval:def:10686",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10686"
        },
        {
          "name": "DSA-1169",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1169"
        },
        {
          "name": "1016790",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016790"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4380",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL before 4.1.13 allows local users to cause a denial of service (persistent replication slave crash) via a query with multiupdate and subselects."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDKSA-2006:158",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:158"
            },
            {
              "name": "http://bugs.mysql.com/10442",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/10442"
            },
            {
              "name": "21712",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21712"
            },
            {
              "name": "21762",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21762"
            },
            {
              "name": "19794",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19794"
            },
            {
              "name": "http://lists.mysql.com/internals/26123",
              "refsource": "CONFIRM",
              "url": "http://lists.mysql.com/internals/26123"
            },
            {
              "name": "oval:org.mitre.oval:def:10686",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10686"
            },
            {
              "name": "DSA-1169",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1169"
            },
            {
              "name": "1016790",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016790"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4380",
    "datePublished": "2006-08-28T18:00:00",
    "dateReserved": "2006-08-28T00:00:00",
    "dateUpdated": "2024-08-07T19:06:07.628Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0115
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:16
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.594Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0115",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0115",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-12-12T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.594Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-1848
Vulnerability from cvelistv5
Published
2010-06-07 20:00
Modified
2024-08-07 01:35
Severity ?
Summary
Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:35:53.730Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4435"
          },
          {
            "name": "RHSA-2010:0824",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
          },
          {
            "name": "oval:org.mitre.oval:def:10258",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258"
          },
          {
            "name": "oval:org.mitre.oval:def:7210",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210"
          },
          {
            "name": "APPLE-SA-2010-11-10-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/commits/107532"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=53371"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
          },
          {
            "name": "RHSA-2010:0442",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
          },
          {
            "name": "SUSE-SR:2010:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
          },
          {
            "name": "1024031",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1024031"
          },
          {
            "name": "MDVSA-2010:107",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
          },
          {
            "name": "SUSE-SR:2010:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4435"
        },
        {
          "name": "RHSA-2010:0824",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
        },
        {
          "name": "oval:org.mitre.oval:def:10258",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258"
        },
        {
          "name": "oval:org.mitre.oval:def:7210",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210"
        },
        {
          "name": "APPLE-SA-2010-11-10-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.mysql.com/commits/107532"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=53371"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
        },
        {
          "name": "RHSA-2010:0442",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
        },
        {
          "name": "SUSE-SR:2010:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
        },
        {
          "name": "1024031",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1024031"
        },
        {
          "name": "MDVSA-2010:107",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
        },
        {
          "name": "SUSE-SR:2010:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-1848",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "http://support.apple.com/kb/HT4435",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4435"
            },
            {
              "name": "RHSA-2010:0824",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
            },
            {
              "name": "oval:org.mitre.oval:def:10258",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258"
            },
            {
              "name": "oval:org.mitre.oval:def:7210",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210"
            },
            {
              "name": "APPLE-SA-2010-11-10-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
            },
            {
              "name": "http://lists.mysql.com/commits/107532",
              "refsource": "MISC",
              "url": "http://lists.mysql.com/commits/107532"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=53371",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=53371"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
            },
            {
              "name": "RHSA-2010:0442",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
            },
            {
              "name": "SUSE-SR:2010:021",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
            },
            {
              "name": "1024031",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1024031"
            },
            {
              "name": "MDVSA-2010:107",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
            },
            {
              "name": "SUSE-SR:2010:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-1848",
    "datePublished": "2010-06-07T20:00:00",
    "dateReserved": "2010-05-06T00:00:00",
    "dateUpdated": "2024-08-07T01:35:53.730Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-2753
Vulnerability from cvelistv5
Published
2006-06-01 17:00
Modified
2024-08-07 17:58
Severity ?
Summary
SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input.
References
http://www.debian.org/security/2006/dsa-1092vendor-advisory, x_refsource_DEBIAN
http://lists.mysql.com/announce/364x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/26875vdb-entry, x_refsource_XF
http://secunia.com/advisories/20712third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:097vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/20541third-party-advisory, x_refsource_SECUNIA
http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlthird-party-advisory, x_refsource_CERT
http://secunia.com/advisories/20562third-party-advisory, x_refsource_SECUNIA
http://www.trustix.org/errata/2006/0034/vendor-advisory, x_refsource_TRUSTIX
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlvendor-advisory, x_refsource_APPLE
http://docs.info.apple.com/article.html?artnum=305214x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-200606-13.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/20365third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20531third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10312vdb-entry, signature, x_refsource_OVAL
http://www.vupen.com/english/advisories/2006/2105vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/18219vdb-entry, x_refsource_BID
http://secunia.com/advisories/20489third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1016216vdb-entry, x_refsource_SECTRACK
https://usn.ubuntu.com/303-1/vendor-advisory, x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2007/0930vdb-entry, x_refsource_VUPEN
http://www.ubuntu.com/usn/usn-288-3vendor-advisory, x_refsource_UBUNTU
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735x_refsource_CONFIRM
http://secunia.com/advisories/20625third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-0544.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/24479third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:58:51.900Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-1092",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1092"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/announce/364"
          },
          {
            "name": "mysql-ascii-sql-injection(26875)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26875"
          },
          {
            "name": "20712",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20712"
          },
          {
            "name": "MDKSA-2006:097",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:097"
          },
          {
            "name": "20541",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20541"
          },
          {
            "name": "TA07-072A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
          },
          {
            "name": "20562",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20562"
          },
          {
            "name": "2006-0034",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0034/"
          },
          {
            "name": "APPLE-SA-2007-03-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=305214"
          },
          {
            "name": "GLSA-200606-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-13.xml"
          },
          {
            "name": "20365",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20365"
          },
          {
            "name": "20531",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20531"
          },
          {
            "name": "oval:org.mitre.oval:def:10312",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10312"
          },
          {
            "name": "ADV-2006-2105",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2105"
          },
          {
            "name": "18219",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18219"
          },
          {
            "name": "20489",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20489"
          },
          {
            "name": "1016216",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016216"
          },
          {
            "name": "USN-303-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/303-1/"
          },
          {
            "name": "ADV-2007-0930",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0930"
          },
          {
            "name": "USN-288-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-288-3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735"
          },
          {
            "name": "20625",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20625"
          },
          {
            "name": "RHSA-2006:0544",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
          },
          {
            "name": "24479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24479"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "DSA-1092",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1092"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://lists.mysql.com/announce/364"
        },
        {
          "name": "mysql-ascii-sql-injection(26875)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26875"
        },
        {
          "name": "20712",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20712"
        },
        {
          "name": "MDKSA-2006:097",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:097"
        },
        {
          "name": "20541",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20541"
        },
        {
          "name": "TA07-072A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
        },
        {
          "name": "20562",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20562"
        },
        {
          "name": "2006-0034",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0034/"
        },
        {
          "name": "APPLE-SA-2007-03-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=305214"
        },
        {
          "name": "GLSA-200606-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-13.xml"
        },
        {
          "name": "20365",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20365"
        },
        {
          "name": "20531",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20531"
        },
        {
          "name": "oval:org.mitre.oval:def:10312",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10312"
        },
        {
          "name": "ADV-2006-2105",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2105"
        },
        {
          "name": "18219",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18219"
        },
        {
          "name": "20489",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20489"
        },
        {
          "name": "1016216",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016216"
        },
        {
          "name": "USN-303-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/303-1/"
        },
        {
          "name": "ADV-2007-0930",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0930"
        },
        {
          "name": "USN-288-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-288-3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735"
        },
        {
          "name": "20625",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20625"
        },
        {
          "name": "RHSA-2006:0544",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
        },
        {
          "name": "24479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24479"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2006-2753",
    "datePublished": "2006-06-01T17:00:00",
    "dateReserved": "2006-06-01T00:00:00",
    "dateUpdated": "2024-08-07T17:58:51.900Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0118
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:16
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0113.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.606Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0113."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0118",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0113."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0118",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-12-12T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.606Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2003-0780
Vulnerability from cvelistv5
Published
2003-09-12 04:00
Modified
2024-08-08 02:05
Severity ?
Summary
Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field.
References
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000743vendor-advisory, x_refsource_CONECTIVA
http://www.redhat.com/support/errata/RHSA-2003-282.htmlvendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDKSA-2003:094vendor-advisory, x_refsource_MANDRAKE
http://marc.info/?l=bugtraq&m=106364207129993&w=2mailing-list, x_refsource_BUGTRAQ
http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.htmlmailing-list, x_refsource_FULLDISC
http://www.debian.org/security/2003/dsa-381vendor-advisory, x_refsource_DEBIAN
http://www.kb.cert.org/vuls/id/516492third-party-advisory, x_refsource_CERT-VN
http://www.redhat.com/support/errata/RHSA-2003-281.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/archive/1/337012mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/9709third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=106381424420775&w=2vendor-advisory, x_refsource_TRUSTIX
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:05:12.567Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "CLA-2003:743",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743"
          },
          {
            "name": "RHSA-2003:282",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html"
          },
          {
            "name": "MDKSA-2003:094",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094"
          },
          {
            "name": "20030913 exploit for mysql -- [get_salt_from_password] problem",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2"
          },
          {
            "name": "20030910 Buffer overflow in MySQL",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html"
          },
          {
            "name": "DSA-381",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-381"
          },
          {
            "name": "VU#516492",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/516492"
          },
          {
            "name": "RHSA-2003:281",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html"
          },
          {
            "name": "20030910 Buffer overflow in MySQL",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/337012"
          },
          {
            "name": "9709",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/9709"
          },
          {
            "name": "2003-0034",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-09-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "CLA-2003:743",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743"
        },
        {
          "name": "RHSA-2003:282",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html"
        },
        {
          "name": "MDKSA-2003:094",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094"
        },
        {
          "name": "20030913 exploit for mysql -- [get_salt_from_password] problem",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2"
        },
        {
          "name": "20030910 Buffer overflow in MySQL",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html"
        },
        {
          "name": "DSA-381",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-381"
        },
        {
          "name": "VU#516492",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/516492"
        },
        {
          "name": "RHSA-2003:281",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html"
        },
        {
          "name": "20030910 Buffer overflow in MySQL",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/337012"
        },
        {
          "name": "9709",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/9709"
        },
        {
          "name": "2003-0034",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0780",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "CLA-2003:743",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743"
            },
            {
              "name": "RHSA-2003:282",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html"
            },
            {
              "name": "MDKSA-2003:094",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094"
            },
            {
              "name": "20030913 exploit for mysql -- [get_salt_from_password] problem",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2"
            },
            {
              "name": "20030910 Buffer overflow in MySQL",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html"
            },
            {
              "name": "DSA-381",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-381"
            },
            {
              "name": "VU#516492",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/516492"
            },
            {
              "name": "RHSA-2003:281",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html"
            },
            {
              "name": "20030910 Buffer overflow in MySQL",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/337012"
            },
            {
              "name": "9709",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/9709"
            },
            {
              "name": "2003-0034",
              "refsource": "TRUSTIX",
              "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0780",
    "datePublished": "2003-09-12T04:00:00",
    "dateReserved": "2003-09-11T00:00:00",
    "dateUpdated": "2024-08-08T02:05:12.567Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-0381
Vulnerability from cvelistv5
Published
2004-04-06 04:00
Modified
2024-08-08 00:17
Severity ?
Summary
mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.
References
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557vdb-entry, signature, x_refsource_OVAL
http://www.securityfocus.com/bid/9976vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/15617vdb-entry, x_refsource_XF
http://www.debian.org/security/2004/dsa-483vendor-advisory, x_refsource_DEBIAN
http://security.gentoo.org/glsa/glsa-200405-20.xmlvendor-advisory, x_refsource_GENTOO
http://www.mandriva.com/security/advisories?name=MDKSA-2004:034vendor-advisory, x_refsource_MANDRAKE
http://www.redhat.com/support/errata/RHSA-2004-597.htmlvendor-advisory, x_refsource_REDHAT
http://www.ciac.org/ciac/bulletins/p-018.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
http://marc.info/?l=bugtraq&m=108206802810402&w=2mailing-list, x_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2004-569.htmlvendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=108023246916294&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:17:14.402Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:11557",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557"
          },
          {
            "name": "9976",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/9976"
          },
          {
            "name": "mysql-mysqlbug-symlink(15617)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15617"
          },
          {
            "name": "DSA-483",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2004/dsa-483"
          },
          {
            "name": "GLSA-200405-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200405-20.xml"
          },
          {
            "name": "MDKSA-2004:034",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:034"
          },
          {
            "name": "RHSA-2004:597",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
          },
          {
            "name": "P-018",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
          },
          {
            "name": "20040414 [OpenPKG-SA-2004.014] OpenPKG Security Advisory (mysql)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108206802810402\u0026w=2"
          },
          {
            "name": "RHSA-2004:569",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2004-569.html"
          },
          {
            "name": "20040324 mysqlbug tmpfile/symlink vulnerability.",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108023246916294\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:11557",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557"
        },
        {
          "name": "9976",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/9976"
        },
        {
          "name": "mysql-mysqlbug-symlink(15617)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15617"
        },
        {
          "name": "DSA-483",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2004/dsa-483"
        },
        {
          "name": "GLSA-200405-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200405-20.xml"
        },
        {
          "name": "MDKSA-2004:034",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:034"
        },
        {
          "name": "RHSA-2004:597",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
        },
        {
          "name": "P-018",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
        },
        {
          "name": "20040414 [OpenPKG-SA-2004.014] OpenPKG Security Advisory (mysql)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=108206802810402\u0026w=2"
        },
        {
          "name": "RHSA-2004:569",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2004-569.html"
        },
        {
          "name": "20040324 mysqlbug tmpfile/symlink vulnerability.",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=108023246916294\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0381",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "oval:org.mitre.oval:def:11557",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557"
            },
            {
              "name": "9976",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/9976"
            },
            {
              "name": "mysql-mysqlbug-symlink(15617)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15617"
            },
            {
              "name": "DSA-483",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2004/dsa-483"
            },
            {
              "name": "GLSA-200405-20",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200405-20.xml"
            },
            {
              "name": "MDKSA-2004:034",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:034"
            },
            {
              "name": "RHSA-2004:597",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
            },
            {
              "name": "P-018",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
            },
            {
              "name": "20040414 [OpenPKG-SA-2004.014] OpenPKG Security Advisory (mysql)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=108206802810402\u0026w=2"
            },
            {
              "name": "RHSA-2004:569",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2004-569.html"
            },
            {
              "name": "20040324 mysqlbug tmpfile/symlink vulnerability.",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=108023246916294\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0381",
    "datePublished": "2004-04-06T04:00:00",
    "dateReserved": "2004-04-05T00:00:00",
    "dateUpdated": "2024-08-08T00:17:14.402Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-0711
Vulnerability from cvelistv5
Published
2005-03-11 05:00
Modified
2024-08-07 21:21
Severity ?
Summary
MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:21:06.505Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:9591",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9591"
          },
          {
            "name": "2005-0009",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2005/0009/"
          },
          {
            "name": "DSA-707",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-707"
          },
          {
            "name": "RHSA-2005:334",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html"
          },
          {
            "name": "101864",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
          },
          {
            "name": "SUSE-SA:2005:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html"
          },
          {
            "name": "USN-96-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/96-1/"
          },
          {
            "name": "RHSA-2005:348",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html"
          },
          {
            "name": "20050310 Mysql insecure temporary file creation with CREATE TEMPORARY TABLE privilege escalation",
            "tags": [
              "mailing-list",
              "x_refsource_VULNWATCH",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0082.html"
          },
          {
            "name": "APPLE-SA-2005-08-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
          },
          {
            "name": "MDKSA-2005:060",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060"
          },
          {
            "name": "GLSA-200503-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml"
          },
          {
            "name": "APPLE-SA-2005-08-17",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
          },
          {
            "name": "12781",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12781"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-03-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:9591",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9591"
        },
        {
          "name": "2005-0009",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2005/0009/"
        },
        {
          "name": "DSA-707",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-707"
        },
        {
          "name": "RHSA-2005:334",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html"
        },
        {
          "name": "101864",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
        },
        {
          "name": "SUSE-SA:2005:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html"
        },
        {
          "name": "USN-96-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/96-1/"
        },
        {
          "name": "RHSA-2005:348",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html"
        },
        {
          "name": "20050310 Mysql insecure temporary file creation with CREATE TEMPORARY TABLE privilege escalation",
          "tags": [
            "mailing-list",
            "x_refsource_VULNWATCH"
          ],
          "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0082.html"
        },
        {
          "name": "APPLE-SA-2005-08-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
        },
        {
          "name": "MDKSA-2005:060",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060"
        },
        {
          "name": "GLSA-200503-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml"
        },
        {
          "name": "APPLE-SA-2005-08-17",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
        },
        {
          "name": "12781",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12781"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2005-0711",
    "datePublished": "2005-03-11T05:00:00",
    "dateReserved": "2005-03-11T00:00:00",
    "dateUpdated": "2024-08-07T21:21:06.505Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-0835
Vulnerability from cvelistv5
Published
2004-10-16 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.
References
http://bugs.mysql.com/bug.php?id=3270x_refsource_MISC
http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.htmlx_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2004-611.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/12783/third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2004/dsa-562vendor-advisory, x_refsource_DEBIAN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1vendor-advisory, x_refsource_SUNALERT
http://www.securityfocus.com/bid/11357vdb-entry, x_refsource_BID
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892vendor-advisory, x_refsource_CONECTIVA
http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.htmlx_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/17666vdb-entry, x_refsource_XF
http://www.redhat.com/support/errata/RHSA-2004-597.htmlvendor-advisory, x_refsource_REDHAT
http://www.ciac.org/ciac/bulletins/p-018.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
http://www.gentoo.org/security/en/glsa/glsa-200410-22.xmlvendor-advisory, x_refsource_GENTOO
http://www.trustix.org/errata/2004/0054/vendor-advisory, x_refsource_TRUSTIX
http://lists.mysql.com/internals/13073x_refsource_MISC
http://securitytracker.com/id?1011606vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:31:47.847Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=3270"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html"
          },
          {
            "name": "RHSA-2004:611",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html"
          },
          {
            "name": "12783",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/12783/"
          },
          {
            "name": "DSA-562",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2004/dsa-562"
          },
          {
            "name": "101864",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
          },
          {
            "name": "11357",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11357"
          },
          {
            "name": "CLA-2004:892",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html"
          },
          {
            "name": "mysql-alter-restriction-bypass(17666)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17666"
          },
          {
            "name": "RHSA-2004:597",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
          },
          {
            "name": "P-018",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
          },
          {
            "name": "GLSA-200410-22",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml"
          },
          {
            "name": "2004-0054",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2004/0054/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/internals/13073"
          },
          {
            "name": "1011606",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1011606"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-10-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=3270"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html"
        },
        {
          "name": "RHSA-2004:611",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html"
        },
        {
          "name": "12783",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/12783/"
        },
        {
          "name": "DSA-562",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2004/dsa-562"
        },
        {
          "name": "101864",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
        },
        {
          "name": "11357",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11357"
        },
        {
          "name": "CLA-2004:892",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html"
        },
        {
          "name": "mysql-alter-restriction-bypass(17666)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17666"
        },
        {
          "name": "RHSA-2004:597",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
        },
        {
          "name": "P-018",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
        },
        {
          "name": "GLSA-200410-22",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml"
        },
        {
          "name": "2004-0054",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2004/0054/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.mysql.com/internals/13073"
        },
        {
          "name": "1011606",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1011606"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0835",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.mysql.com/bug.php?id=3270",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=3270"
            },
            {
              "name": "http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html",
              "refsource": "CONFIRM",
              "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html"
            },
            {
              "name": "RHSA-2004:611",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html"
            },
            {
              "name": "12783",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/12783/"
            },
            {
              "name": "DSA-562",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2004/dsa-562"
            },
            {
              "name": "101864",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
            },
            {
              "name": "11357",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11357"
            },
            {
              "name": "CLA-2004:892",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892"
            },
            {
              "name": "http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html",
              "refsource": "CONFIRM",
              "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html"
            },
            {
              "name": "mysql-alter-restriction-bypass(17666)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17666"
            },
            {
              "name": "RHSA-2004:597",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
            },
            {
              "name": "P-018",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
            },
            {
              "name": "GLSA-200410-22",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml"
            },
            {
              "name": "2004-0054",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2004/0054/"
            },
            {
              "name": "http://lists.mysql.com/internals/13073",
              "refsource": "MISC",
              "url": "http://lists.mysql.com/internals/13073"
            },
            {
              "name": "1011606",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1011606"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0835",
    "datePublished": "2004-10-16T04:00:00",
    "dateReserved": "2004-09-08T00:00:00",
    "dateUpdated": "2024-08-08T00:31:47.847Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-1518
Vulnerability from cvelistv5
Published
2006-05-05 10:00
Modified
2024-08-07 17:12
Severity ?
Summary
Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values.
References
http://www.securityfocus.com/archive/1/432734/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/19929third-party-advisory, x_refsource_SECUNIA
http://www.wisec.it/vulns.php?page=8x_refsource_MISC
http://www.debian.org/security/2006/dsa-1079vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2006/1633vdb-entry, x_refsource_VUPEN
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.htmlvendor-advisory, x_refsource_SUSE
http://securityreason.com/securityalert/839third-party-advisory, x_refsource_SREASON
http://www.novell.com/linux/security/advisories/2006-06-02.htmlvendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/bid/17780vdb-entry, x_refsource_BID
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.htmlx_refsource_CONFIRM
http://secunia.com/advisories/20241third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20762third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26232vdb-entry, x_refsource_XF
http://secunia.com/advisories/20333third-party-advisory, x_refsource_SECUNIA
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939x_refsource_CONFIRM
http://securitytracker.com/id?1016016vdb-entry, x_refsource_SECTRACK
http://www.debian.org/security/2006/dsa-1071vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/20253third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20457third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1073vendor-advisory, x_refsource_DEBIAN
http://www.kb.cert.org/vuls/id/602457third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:12:22.098Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution.",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded"
          },
          {
            "name": "19929",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19929"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.wisec.it/vulns.php?page=8"
          },
          {
            "name": "DSA-1079",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1079"
          },
          {
            "name": "ADV-2006-1633",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1633"
          },
          {
            "name": "SUSE-SA:2006:036",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
          },
          {
            "name": "839",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/839"
          },
          {
            "name": "SUSE-SR:2006:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
          },
          {
            "name": "17780",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17780"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
          },
          {
            "name": "20241",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20241"
          },
          {
            "name": "20762",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20762"
          },
          {
            "name": "mysql-comtabledump-bo(26232)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26232"
          },
          {
            "name": "20333",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20333"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939"
          },
          {
            "name": "1016016",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016016"
          },
          {
            "name": "DSA-1071",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1071"
          },
          {
            "name": "20253",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20253"
          },
          {
            "name": "20457",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20457"
          },
          {
            "name": "DSA-1073",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1073"
          },
          {
            "name": "VU#602457",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/602457"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
        "shortName": "debian"
      },
      "references": [
        {
          "name": "20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution.",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded"
        },
        {
          "name": "19929",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19929"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.wisec.it/vulns.php?page=8"
        },
        {
          "name": "DSA-1079",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1079"
        },
        {
          "name": "ADV-2006-1633",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1633"
        },
        {
          "name": "SUSE-SA:2006:036",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
        },
        {
          "name": "839",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/839"
        },
        {
          "name": "SUSE-SR:2006:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
        },
        {
          "name": "17780",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17780"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
        },
        {
          "name": "20241",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20241"
        },
        {
          "name": "20762",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20762"
        },
        {
          "name": "mysql-comtabledump-bo(26232)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26232"
        },
        {
          "name": "20333",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20333"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939"
        },
        {
          "name": "1016016",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016016"
        },
        {
          "name": "DSA-1071",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1071"
        },
        {
          "name": "20253",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20253"
        },
        {
          "name": "20457",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20457"
        },
        {
          "name": "DSA-1073",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1073"
        },
        {
          "name": "VU#602457",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/602457"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@debian.org",
          "ID": "CVE-2006-1518",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution.",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded"
            },
            {
              "name": "19929",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19929"
            },
            {
              "name": "http://www.wisec.it/vulns.php?page=8",
              "refsource": "MISC",
              "url": "http://www.wisec.it/vulns.php?page=8"
            },
            {
              "name": "DSA-1079",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1079"
            },
            {
              "name": "ADV-2006-1633",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1633"
            },
            {
              "name": "SUSE-SA:2006:036",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
            },
            {
              "name": "839",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/839"
            },
            {
              "name": "SUSE-SR:2006:012",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
            },
            {
              "name": "17780",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17780"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
            },
            {
              "name": "20241",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20241"
            },
            {
              "name": "20762",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20762"
            },
            {
              "name": "mysql-comtabledump-bo(26232)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26232"
            },
            {
              "name": "20333",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20333"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939"
            },
            {
              "name": "1016016",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016016"
            },
            {
              "name": "DSA-1071",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1071"
            },
            {
              "name": "20253",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20253"
            },
            {
              "name": "20457",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20457"
            },
            {
              "name": "DSA-1073",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1073"
            },
            {
              "name": "VU#602457",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/602457"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
    "assignerShortName": "debian",
    "cveId": "CVE-2006-1518",
    "datePublished": "2006-05-05T10:00:00",
    "dateReserved": "2006-03-30T00:00:00",
    "dateUpdated": "2024-08-07T17:12:22.098Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-12419
Vulnerability from cvelistv5
Published
2017-08-05 15:00
Modified
2024-08-05 18:36
Severity ?
Summary
If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T18:36:56.181Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://mantisbt.org/bugs/view.php?id=23173"
          },
          {
            "name": "100142",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/100142"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2017/08/04/6"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-08-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the \u0027admin\u0027 directory (as recommended in the \"Post-installation and upgrade tasks\" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL\u0027s \"connect file read\" feature to remotely access files on the MantisBT server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-08T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://mantisbt.org/bugs/view.php?id=23173"
        },
        {
          "name": "100142",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/100142"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://openwall.com/lists/oss-security/2017/08/04/6"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-12419",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the \u0027admin\u0027 directory (as recommended in the \"Post-installation and upgrade tasks\" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL\u0027s \"connect file read\" feature to remotely access files on the MantisBT server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://mantisbt.org/bugs/view.php?id=23173",
              "refsource": "CONFIRM",
              "url": "https://mantisbt.org/bugs/view.php?id=23173"
            },
            {
              "name": "100142",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/100142"
            },
            {
              "name": "http://openwall.com/lists/oss-security/2017/08/04/6",
              "refsource": "CONFIRM",
              "url": "http://openwall.com/lists/oss-security/2017/08/04/6"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-12419",
    "datePublished": "2017-08-05T15:00:00",
    "dateReserved": "2017-08-03T00:00:00",
    "dateUpdated": "2024-08-05T18:36:56.181Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3834
Vulnerability from cvelistv5
Published
2011-01-14 18:00
Modified
2024-08-07 03:26
Severity ?
Summary
Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:26:12.223Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
          },
          {
            "name": "mysql-derived-table-dos(64844)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4723"
          },
          {
            "name": "42875",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42875"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640808"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "APPLE-SA-2011-06-23-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
          },
          {
            "name": "TLSA-2011-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
          },
          {
            "name": "ADV-2011-0105",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0105"
          },
          {
            "name": "MDVSA-2010:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
          },
          {
            "name": "DSA-2143",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2143"
          },
          {
            "name": "43676",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43676"
          },
          {
            "name": "ADV-2011-0345",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0345"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=55568"
          },
          {
            "name": "MDVSA-2010:223",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to \"materializing a derived table that required a temporary table for grouping\" and \"user variable assignments.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
        },
        {
          "name": "mysql-derived-table-dos(64844)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4723"
        },
        {
          "name": "42875",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42875"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640808"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "APPLE-SA-2011-06-23-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
        },
        {
          "name": "TLSA-2011-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
        },
        {
          "name": "ADV-2011-0105",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0105"
        },
        {
          "name": "MDVSA-2010:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
        },
        {
          "name": "DSA-2143",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2143"
        },
        {
          "name": "43676",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43676"
        },
        {
          "name": "ADV-2011-0345",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0345"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=55568"
        },
        {
          "name": "MDVSA-2010:223",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3834",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to \"materializing a derived table that required a temporary table for grouping\" and \"user variable assignments.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
            },
            {
              "name": "mysql-derived-table-dos(64844)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "http://support.apple.com/kb/HT4723",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4723"
            },
            {
              "name": "42875",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42875"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640808",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640808"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "APPLE-SA-2011-06-23-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
            },
            {
              "name": "TLSA-2011-3",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
            },
            {
              "name": "ADV-2011-0105",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0105"
            },
            {
              "name": "MDVSA-2010:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
            },
            {
              "name": "DSA-2143",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2143"
            },
            {
              "name": "43676",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43676"
            },
            {
              "name": "ADV-2011-0345",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0345"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=55568",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=55568"
            },
            {
              "name": "MDVSA-2010:223",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3834",
    "datePublished": "2011-01-14T18:00:00",
    "dateReserved": "2010-10-07T00:00:00",
    "dateUpdated": "2024-08-07T03:26:12.223Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3837
Vulnerability from cvelistv5
Published
2011-01-14 18:00
Modified
2024-08-07 03:26
Severity ?
Summary
MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.
References
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.htmlx_refsource_CONFIRM
http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.htmlx_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://support.apple.com/kb/HT4723x_refsource_CONFIRM
http://secunia.com/advisories/42875third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1017-1vendor-advisory, x_refsource_UBUNTU
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txtvendor-advisory, x_refsource_TURBO
http://www.vupen.com/english/advisories/2011/0105vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:222vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2011-0164.htmlvendor-advisory, x_refsource_REDHAT
http://bugs.mysql.com/bug.php?id=54476x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/0170vdb-entry, x_refsource_VUPEN
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.htmlx_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2143vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/43676vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2011/0345vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/42936third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/64841vdb-entry, x_refsource_XF
https://bugzilla.redhat.com/show_bug.cgi?id=640856x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2010-0825.htmlvendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDVSA-2010:223vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:26:11.503Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4723"
          },
          {
            "name": "42875",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42875"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "APPLE-SA-2011-06-23-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
          },
          {
            "name": "TLSA-2011-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
          },
          {
            "name": "ADV-2011-0105",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0105"
          },
          {
            "name": "MDVSA-2010:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=54476"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
          },
          {
            "name": "DSA-2143",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2143"
          },
          {
            "name": "43676",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43676"
          },
          {
            "name": "ADV-2011-0345",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0345"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "name": "mysql-prepared-statement-dos(64841)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64841"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640856"
          },
          {
            "name": "RHSA-2010:0825",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
          },
          {
            "name": "MDVSA-2010:223",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4723"
        },
        {
          "name": "42875",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42875"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "APPLE-SA-2011-06-23-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
        },
        {
          "name": "TLSA-2011-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
        },
        {
          "name": "ADV-2011-0105",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0105"
        },
        {
          "name": "MDVSA-2010:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=54476"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
        },
        {
          "name": "DSA-2143",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2143"
        },
        {
          "name": "43676",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43676"
        },
        {
          "name": "ADV-2011-0345",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0345"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "name": "mysql-prepared-statement-dos(64841)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64841"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640856"
        },
        {
          "name": "RHSA-2010:0825",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
        },
        {
          "name": "MDVSA-2010:223",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3837",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "http://support.apple.com/kb/HT4723",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4723"
            },
            {
              "name": "42875",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42875"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "APPLE-SA-2011-06-23-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
            },
            {
              "name": "TLSA-2011-3",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
            },
            {
              "name": "ADV-2011-0105",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0105"
            },
            {
              "name": "MDVSA-2010:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=54476",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=54476"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
            },
            {
              "name": "DSA-2143",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2143"
            },
            {
              "name": "43676",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43676"
            },
            {
              "name": "ADV-2011-0345",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0345"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "mysql-prepared-statement-dos(64841)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64841"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640856",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640856"
            },
            {
              "name": "RHSA-2010:0825",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
            },
            {
              "name": "MDVSA-2010:223",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3837",
    "datePublished": "2011-01-14T18:00:00",
    "dateReserved": "2010-10-07T00:00:00",
    "dateUpdated": "2024-08-07T03:26:11.503Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-0819
Vulnerability from cvelistv5
Published
2009-03-05 02:00
Modified
2024-08-07 04:48
Severity ?
Summary
sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via "an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML()," which triggers an assertion failure.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:48:52.280Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html"
          },
          {
            "name": "mysql-xpath-dos(49050)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050"
          },
          {
            "name": "34115",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34115"
          },
          {
            "name": "ADV-2009-0594",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0594"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=42495"
          },
          {
            "name": "33972",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/33972"
          },
          {
            "name": "1021786",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021786"
          },
          {
            "name": "oval:org.mitre.oval:def:7544",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-02-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" which triggers an assertion failure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html"
        },
        {
          "name": "mysql-xpath-dos(49050)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050"
        },
        {
          "name": "34115",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34115"
        },
        {
          "name": "ADV-2009-0594",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0594"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=42495"
        },
        {
          "name": "33972",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/33972"
        },
        {
          "name": "1021786",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021786"
        },
        {
          "name": "oval:org.mitre.oval:def:7544",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0819",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" which triggers an assertion failure."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html"
            },
            {
              "name": "mysql-xpath-dos(49050)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050"
            },
            {
              "name": "34115",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34115"
            },
            {
              "name": "ADV-2009-0594",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0594"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=42495",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=42495"
            },
            {
              "name": "33972",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/33972"
            },
            {
              "name": "1021786",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021786"
            },
            {
              "name": "oval:org.mitre.oval:def:7544",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0819",
    "datePublished": "2009-03-05T02:00:00",
    "dateReserved": "2009-03-04T00:00:00",
    "dateUpdated": "2024-08-07T04:48:52.280Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0553
Vulnerability from cvelistv5
Published
2013-03-28 23:00
Modified
2024-08-06 18:30
Severity ?
Summary
Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:30:53.666Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow"
          },
          {
            "name": "52445",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/52445"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-02-10T22:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow"
        },
        {
          "name": "52445",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/52445"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0553",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html",
              "refsource": "MISC",
              "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow",
              "refsource": "CONFIRM",
              "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow"
            },
            {
              "name": "52445",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/52445"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0553",
    "datePublished": "2013-03-28T23:00:00",
    "dateReserved": "2012-01-11T00:00:00",
    "dateUpdated": "2024-08-06T18:30:53.666Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2003-1480
Vulnerability from cvelistv5
Published
2007-10-24 23:00
Modified
2024-09-16 22:15
Severity ?
Summary
MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods.
References
http://secunia.com/advisories/8753third-party-advisory, x_refsource_SECUNIA
http://www.securiteam.com/tools/5WP031FA0U.htmlx_refsource_MISC
http://www.securityfocus.com/bid/7500vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:28:03.597Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "8753",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/8753"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.securiteam.com/tools/5WP031FA0U.html"
          },
          {
            "name": "7500",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/7500"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-10-24T23:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "8753",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/8753"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.securiteam.com/tools/5WP031FA0U.html"
        },
        {
          "name": "7500",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/7500"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-1480",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "8753",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/8753"
            },
            {
              "name": "http://www.securiteam.com/tools/5WP031FA0U.html",
              "refsource": "MISC",
              "url": "http://www.securiteam.com/tools/5WP031FA0U.html"
            },
            {
              "name": "7500",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/7500"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-1480",
    "datePublished": "2007-10-24T23:00:00Z",
    "dateReserved": "2007-10-24T00:00:00Z",
    "dateUpdated": "2024-09-16T22:15:13.176Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-4019
Vulnerability from cvelistv5
Published
2009-11-30 17:00
Modified
2024-08-07 06:45
Severity ?
Summary
mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.
References
http://secunia.com/advisories/38573third-party-advisory, x_refsource_SECUNIA
http://bugs.mysql.com/48291x_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://marc.info/?l=oss-security&m=125901161824278&w=2mailing-list, x_refsource_MLIST
http://secunia.com/advisories/38517third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0109.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2010/1107vdb-entry, x_refsource_VUPEN
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.htmlvendor-advisory, x_refsource_FEDORA
http://ubuntu.com/usn/usn-897-1vendor-advisory, x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.htmlvendor-advisory, x_refsource_SUSE
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlvendor-advisory, x_refsource_APPLE
https://bugzilla.redhat.com/show_bug.cgi?id=540906x_refsource_CONFIRM
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.htmlx_refsource_CONFIRM
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.htmlx_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349vdb-entry, signature, x_refsource_OVAL
http://support.apple.com/kb/HT4077x_refsource_CONFIRM
http://marc.info/?l=oss-security&m=125881733826437&w=2mailing-list, x_refsource_MLIST
http://secunia.com/advisories/37717third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=oss-security&m=125883754215621&w=2mailing-list, x_refsource_MLIST
http://bugs.mysql.com/47780x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500vdb-entry, signature, x_refsource_OVAL
http://www.debian.org/security/2010/dsa-1997vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:45:50.912Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "38573",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38573"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/48291"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "[oss-security] 20091123 Re: CVE Request - MySQL - 5.0.88",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=125901161824278\u0026w=2"
          },
          {
            "name": "38517",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38517"
          },
          {
            "name": "RHSA-2010:0109",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html"
          },
          {
            "name": "ADV-2010-1107",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1107"
          },
          {
            "name": "FEDORA-2009-12180",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html"
          },
          {
            "name": "USN-897-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-897-1"
          },
          {
            "name": "SUSE-SR:2010:011",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
          },
          {
            "name": "APPLE-SA-2010-03-29-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540906"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html"
          },
          {
            "name": "oval:org.mitre.oval:def:11349",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4077"
          },
          {
            "name": "[oss-security] 20091121 CVE Request - MySQL - 5.0.88",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2"
          },
          {
            "name": "37717",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37717"
          },
          {
            "name": "[oss-security] 20091121 Re: CVE Request - MySQL - 5.0.88",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=125883754215621\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/47780"
          },
          {
            "name": "oval:org.mitre.oval:def:8500",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500"
          },
          {
            "name": "DSA-1997",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2010/dsa-1997"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-11-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "38573",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38573"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/48291"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "[oss-security] 20091123 Re: CVE Request - MySQL - 5.0.88",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=125901161824278\u0026w=2"
        },
        {
          "name": "38517",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38517"
        },
        {
          "name": "RHSA-2010:0109",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html"
        },
        {
          "name": "ADV-2010-1107",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1107"
        },
        {
          "name": "FEDORA-2009-12180",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html"
        },
        {
          "name": "USN-897-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-897-1"
        },
        {
          "name": "SUSE-SR:2010:011",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
        },
        {
          "name": "APPLE-SA-2010-03-29-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540906"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html"
        },
        {
          "name": "oval:org.mitre.oval:def:11349",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4077"
        },
        {
          "name": "[oss-security] 20091121 CVE Request - MySQL - 5.0.88",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2"
        },
        {
          "name": "37717",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37717"
        },
        {
          "name": "[oss-security] 20091121 Re: CVE Request - MySQL - 5.0.88",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=125883754215621\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/47780"
        },
        {
          "name": "oval:org.mitre.oval:def:8500",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500"
        },
        {
          "name": "DSA-1997",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2010/dsa-1997"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-4019",
    "datePublished": "2009-11-30T17:00:00",
    "dateReserved": "2009-11-20T00:00:00",
    "dateUpdated": "2024-08-07T06:45:50.912Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-6303
Vulnerability from cvelistv5
Published
2007-12-10 21:00
Modified
2024-08-07 16:02
Severity ?
Summary
MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement.
References
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040x_refsource_CONFIRM
http://lists.mysql.com/announce/502x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200804-04.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/29706third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/38989vdb-entry, x_refsource_XF
http://secunia.com/advisories/29443third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:017vendor-advisory, x_refsource_MANDRIVA
https://issues.rpath.com/browse/RPL-2187x_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.htmlvendor-advisory, x_refsource_FEDORA
http://www.redhat.com/support/errata/RHSA-2007-1157.htmlvendor-advisory, x_refsource_REDHAT
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.htmlx_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/4198vdb-entry, x_refsource_VUPEN
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.htmlvendor-advisory, x_refsource_FEDORA
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.htmlx_refsource_CONFIRM
http://bugs.mysql.com/bug.php?id=29908x_refsource_CONFIRM
http://www.securityfocus.com/bid/26832vdb-entry, x_refsource_BID
http://securitytracker.com/id?1019085vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/28025third-party-advisory, x_refsource_SECUNIA
http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.htmlx_refsource_CONFIRM
http://www.securityfocus.com/archive/1/487606/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/28838third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-588-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/28063third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/28739third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:02:36.321Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/announce/502"
          },
          {
            "name": "GLSA-200804-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml"
          },
          {
            "name": "29706",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29706"
          },
          {
            "name": "mysql-definer-value-privilege-escalation(38989)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38989"
          },
          {
            "name": "29443",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29443"
          },
          {
            "name": "MDVSA-2008:017",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2187"
          },
          {
            "name": "FEDORA-2007-4465",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html"
          },
          {
            "name": "RHSA-2007:1157",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
          },
          {
            "name": "ADV-2007-4198",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4198"
          },
          {
            "name": "FEDORA-2007-4471",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=29908"
          },
          {
            "name": "26832",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26832"
          },
          {
            "name": "1019085",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1019085"
          },
          {
            "name": "28025",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28025"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html"
          },
          {
            "name": "20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded"
          },
          {
            "name": "28838",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28838"
          },
          {
            "name": "USN-588-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-588-1"
          },
          {
            "name": "28063",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28063"
          },
          {
            "name": "SUSE-SR:2008:003",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
          },
          {
            "name": "28739",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28739"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-12-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://lists.mysql.com/announce/502"
        },
        {
          "name": "GLSA-200804-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml"
        },
        {
          "name": "29706",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29706"
        },
        {
          "name": "mysql-definer-value-privilege-escalation(38989)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38989"
        },
        {
          "name": "29443",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29443"
        },
        {
          "name": "MDVSA-2008:017",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2187"
        },
        {
          "name": "FEDORA-2007-4465",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html"
        },
        {
          "name": "RHSA-2007:1157",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
        },
        {
          "name": "ADV-2007-4198",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4198"
        },
        {
          "name": "FEDORA-2007-4471",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=29908"
        },
        {
          "name": "26832",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26832"
        },
        {
          "name": "1019085",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1019085"
        },
        {
          "name": "28025",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28025"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html"
        },
        {
          "name": "20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded"
        },
        {
          "name": "28838",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28838"
        },
        {
          "name": "USN-588-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-588-1"
        },
        {
          "name": "28063",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28063"
        },
        {
          "name": "SUSE-SR:2008:003",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
        },
        {
          "name": "28739",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28739"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6303",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040"
            },
            {
              "name": "http://lists.mysql.com/announce/502",
              "refsource": "CONFIRM",
              "url": "http://lists.mysql.com/announce/502"
            },
            {
              "name": "GLSA-200804-04",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml"
            },
            {
              "name": "29706",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29706"
            },
            {
              "name": "mysql-definer-value-privilege-escalation(38989)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38989"
            },
            {
              "name": "29443",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29443"
            },
            {
              "name": "MDVSA-2008:017",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2187",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2187"
            },
            {
              "name": "FEDORA-2007-4465",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html"
            },
            {
              "name": "RHSA-2007:1157",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
            },
            {
              "name": "ADV-2007-4198",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4198"
            },
            {
              "name": "FEDORA-2007-4471",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=29908",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=29908"
            },
            {
              "name": "26832",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26832"
            },
            {
              "name": "1019085",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1019085"
            },
            {
              "name": "28025",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28025"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html"
            },
            {
              "name": "20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded"
            },
            {
              "name": "28838",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28838"
            },
            {
              "name": "USN-588-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-588-1"
            },
            {
              "name": "28063",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28063"
            },
            {
              "name": "SUSE-SR:2008:003",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
            },
            {
              "name": "28739",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28739"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6303",
    "datePublished": "2007-12-10T21:00:00",
    "dateReserved": "2007-12-10T00:00:00",
    "dateUpdated": "2024-08-07T16:02:36.321Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-1621
Vulnerability from cvelistv5
Published
2010-05-14 19:24
Modified
2024-08-07 01:28
Severity ?
Summary
The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:28:43.062Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=51770"
          },
          {
            "name": "39543",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/39543"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html"
          },
          {
            "name": "MDVSA-2010:093",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-05-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=51770"
        },
        {
          "name": "39543",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/39543"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html"
        },
        {
          "name": "MDVSA-2010:093",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-1621",
    "datePublished": "2010-05-14T19:24:00",
    "dateReserved": "2010-04-29T00:00:00",
    "dateUpdated": "2024-08-07T01:28:43.062Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-0627
Vulnerability from cvelistv5
Published
2004-07-08 04:00
Modified
2024-08-08 00:24
Severity ?
Summary
The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string.
References
http://www.kb.cert.org/vuls/id/184030third-party-advisory, x_refsource_CERT-VN
http://marc.info/?l=bugtraq&m=108904917528205&w=2mailing-list, x_refsource_BUGTRAQ
http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.htmlmailing-list, x_refsource_VULNWATCH
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:24:26.953Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#184030",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/184030"
          },
          {
            "name": "20040705 MySQL Authentication Bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2"
          },
          {
            "name": "20040705 MySQL Authentication Bypass",
            "tags": [
              "mailing-list",
              "x_refsource_VULNWATCH",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-07-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#184030",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/184030"
        },
        {
          "name": "20040705 MySQL Authentication Bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2"
        },
        {
          "name": "20040705 MySQL Authentication Bypass",
          "tags": [
            "mailing-list",
            "x_refsource_VULNWATCH"
          ],
          "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0627",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#184030",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/184030"
            },
            {
              "name": "20040705 MySQL Authentication Bypass",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2"
            },
            {
              "name": "20040705 MySQL Authentication Bypass",
              "refsource": "VULNWATCH",
              "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0627",
    "datePublished": "2004-07-08T04:00:00",
    "dateReserved": "2004-07-06T00:00:00",
    "dateUpdated": "2024-08-08T00:24:26.953Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-2692
Vulnerability from cvelistv5
Published
2007-05-16 01:00
Modified
2024-08-07 13:49
Severity ?
Summary
The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges.
References
http://secunia.com/advisories/27823third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29443third-party-advisory, x_refsource_SECUNIA
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.htmlx_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2007-0894.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/26073third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:028vendor-advisory, x_refsource_MANDRIVA
http://lists.mysql.com/announce/470mailing-list, x_refsource_MLIST
http://www.vupen.com/english/advisories/2007/1804vdb-entry, x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166vdb-entry, signature, x_refsource_OVAL
http://www.securityfocus.com/archive/1/473874/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.securitytracker.com/id?1018070vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/34348vdb-entry, x_refsource_XF
http://secunia.com/advisories/25301third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2007/dsa-1413vendor-advisory, x_refsource_DEBIAN
https://issues.rpath.com/browse/RPL-1536x_refsource_CONFIRM
http://secunia.com/advisories/28637third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30351third-party-advisory, x_refsource_SECUNIA
http://bugs.mysql.com/bug.php?id=27337x_refsource_MISC
http://secunia.com/advisories/26430third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28838third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-588-1vendor-advisory, x_refsource_UBUNTU
http://osvdb.org/34765vdb-entry, x_refsource_OSVDB
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.htmlvendor-advisory, x_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2008-0364.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/24011vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:49:57.306Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "27823",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27823"
          },
          {
            "name": "29443",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29443"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
          },
          {
            "name": "RHSA-2007:0894",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html"
          },
          {
            "name": "26073",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26073"
          },
          {
            "name": "MDVSA-2008:028",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028"
          },
          {
            "name": "[announce] 20070712 MySQL Community Server 5.0.45 has been released!",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/announce/470"
          },
          {
            "name": "ADV-2007-1804",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1804"
          },
          {
            "name": "oval:org.mitre.oval:def:9166",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166"
          },
          {
            "name": "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
          },
          {
            "name": "1018070",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018070"
          },
          {
            "name": "mysql-changedb-privilege-escalation(34348)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34348"
          },
          {
            "name": "25301",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25301"
          },
          {
            "name": "DSA-1413",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1413"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1536"
          },
          {
            "name": "28637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28637"
          },
          {
            "name": "30351",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30351"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=27337"
          },
          {
            "name": "26430",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26430"
          },
          {
            "name": "28838",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28838"
          },
          {
            "name": "USN-588-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-588-1"
          },
          {
            "name": "34765",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/34765"
          },
          {
            "name": "SUSE-SR:2008:003",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
          },
          {
            "name": "RHSA-2008:0364",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
          },
          {
            "name": "24011",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24011"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-05-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "27823",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27823"
        },
        {
          "name": "29443",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29443"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
        },
        {
          "name": "RHSA-2007:0894",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html"
        },
        {
          "name": "26073",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26073"
        },
        {
          "name": "MDVSA-2008:028",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028"
        },
        {
          "name": "[announce] 20070712 MySQL Community Server 5.0.45 has been released!",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.mysql.com/announce/470"
        },
        {
          "name": "ADV-2007-1804",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1804"
        },
        {
          "name": "oval:org.mitre.oval:def:9166",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166"
        },
        {
          "name": "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
        },
        {
          "name": "1018070",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018070"
        },
        {
          "name": "mysql-changedb-privilege-escalation(34348)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34348"
        },
        {
          "name": "25301",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25301"
        },
        {
          "name": "DSA-1413",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1413"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1536"
        },
        {
          "name": "28637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28637"
        },
        {
          "name": "30351",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30351"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=27337"
        },
        {
          "name": "26430",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26430"
        },
        {
          "name": "28838",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28838"
        },
        {
          "name": "USN-588-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-588-1"
        },
        {
          "name": "34765",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/34765"
        },
        {
          "name": "SUSE-SR:2008:003",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
        },
        {
          "name": "RHSA-2008:0364",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
        },
        {
          "name": "24011",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24011"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2692",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "27823",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27823"
            },
            {
              "name": "29443",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29443"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
            },
            {
              "name": "RHSA-2007:0894",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html"
            },
            {
              "name": "26073",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26073"
            },
            {
              "name": "MDVSA-2008:028",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028"
            },
            {
              "name": "[announce] 20070712 MySQL Community Server 5.0.45 has been released!",
              "refsource": "MLIST",
              "url": "http://lists.mysql.com/announce/470"
            },
            {
              "name": "ADV-2007-1804",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1804"
            },
            {
              "name": "oval:org.mitre.oval:def:9166",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166"
            },
            {
              "name": "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
            },
            {
              "name": "1018070",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018070"
            },
            {
              "name": "mysql-changedb-privilege-escalation(34348)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34348"
            },
            {
              "name": "25301",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25301"
            },
            {
              "name": "DSA-1413",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1413"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1536",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1536"
            },
            {
              "name": "28637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28637"
            },
            {
              "name": "30351",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30351"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=27337",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=27337"
            },
            {
              "name": "26430",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26430"
            },
            {
              "name": "28838",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28838"
            },
            {
              "name": "USN-588-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-588-1"
            },
            {
              "name": "34765",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/34765"
            },
            {
              "name": "SUSE-SR:2008:003",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
            },
            {
              "name": "RHSA-2008:0364",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
            },
            {
              "name": "24011",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24011"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2692",
    "datePublished": "2007-05-16T01:00:00",
    "dateReserved": "2007-05-15T00:00:00",
    "dateUpdated": "2024-08-07T13:49:57.306Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3680
Vulnerability from cvelistv5
Published
2011-01-11 19:00
Modified
2024-08-07 03:18
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables with nullable columns while using InnoDB, which triggers an assertion failure.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/42598vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/64686vdb-entry, x_refsource_XF
http://secunia.com/advisories/42875third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1017-1vendor-advisory, x_refsource_UBUNTU
http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txtvendor-advisory, x_refsource_TURBO
http://www.mandriva.com/security/advisories?name=MDVSA-2011:012vendor-advisory, x_refsource_MANDRIVA
https://bugzilla.redhat.com/show_bug.cgi?id=628192x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/0105vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:222vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2011-0164.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0170vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0133vdb-entry, x_refsource_VUPEN
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.htmlx_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2143vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2011/0345vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:155vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/42936third-party-advisory, x_refsource_SECUNIA
http://bugs.mysql.com/bug.php?id=54044x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2010-0825.htmlvendor-advisory, x_refsource_REDHAT
http://www.openwall.com/lists/oss-security/2010/09/28/10mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:18:52.952Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "42598",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42598"
          },
          {
            "name": "mysql-innodb-dos(64686)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64686"
          },
          {
            "name": "42875",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42875"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "TLSA-2011-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
          },
          {
            "name": "MDVSA-2011:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628192"
          },
          {
            "name": "ADV-2011-0105",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0105"
          },
          {
            "name": "MDVSA-2010:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "name": "ADV-2011-0133",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0133"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
          },
          {
            "name": "DSA-2143",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2143"
          },
          {
            "name": "ADV-2011-0345",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0345"
          },
          {
            "name": "MDVSA-2010:155",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=54044"
          },
          {
            "name": "RHSA-2010:0825",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
          },
          {
            "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables with nullable columns while using InnoDB, which triggers an assertion failure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "42598",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42598"
        },
        {
          "name": "mysql-innodb-dos(64686)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64686"
        },
        {
          "name": "42875",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42875"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "TLSA-2011-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
        },
        {
          "name": "MDVSA-2011:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628192"
        },
        {
          "name": "ADV-2011-0105",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0105"
        },
        {
          "name": "MDVSA-2010:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "name": "ADV-2011-0133",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0133"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
        },
        {
          "name": "DSA-2143",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2143"
        },
        {
          "name": "ADV-2011-0345",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0345"
        },
        {
          "name": "MDVSA-2010:155",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=54044"
        },
        {
          "name": "RHSA-2010:0825",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
        },
        {
          "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3680",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables with nullable columns while using InnoDB, which triggers an assertion failure."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "42598",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42598"
            },
            {
              "name": "mysql-innodb-dos(64686)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64686"
            },
            {
              "name": "42875",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42875"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "TLSA-2011-3",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
            },
            {
              "name": "MDVSA-2011:012",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628192",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628192"
            },
            {
              "name": "ADV-2011-0105",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0105"
            },
            {
              "name": "MDVSA-2010:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "ADV-2011-0133",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0133"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
            },
            {
              "name": "DSA-2143",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2143"
            },
            {
              "name": "ADV-2011-0345",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0345"
            },
            {
              "name": "MDVSA-2010:155",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=54044",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=54044"
            },
            {
              "name": "RHSA-2010:0825",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
            },
            {
              "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3680",
    "datePublished": "2011-01-11T19:00:00",
    "dateReserved": "2010-09-28T00:00:00",
    "dateUpdated": "2024-08-07T03:18:52.952Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3836
Vulnerability from cvelistv5
Published
2011-01-14 18:00
Modified
2024-08-07 03:26
Severity ?
Summary
MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers.
References
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.htmlx_refsource_CONFIRM
http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.htmlx_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://support.apple.com/kb/HT4723x_refsource_CONFIRM
http://secunia.com/advisories/42875third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1017-1vendor-advisory, x_refsource_UBUNTU
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txtvendor-advisory, x_refsource_TURBO
http://www.vupen.com/english/advisories/2011/0105vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:222vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2011-0164.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0170vdb-entry, x_refsource_VUPEN
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.htmlx_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2143vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/43676vdb-entry, x_refsource_BID
https://bugzilla.redhat.com/show_bug.cgi?id=640845x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/64842vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2011/0345vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/42936third-party-advisory, x_refsource_SECUNIA
http://bugs.mysql.com/bug.php?id=54568x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2010-0825.htmlvendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDVSA-2010:223vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:26:11.437Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4723"
          },
          {
            "name": "42875",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42875"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "APPLE-SA-2011-06-23-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
          },
          {
            "name": "TLSA-2011-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
          },
          {
            "name": "ADV-2011-0105",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0105"
          },
          {
            "name": "MDVSA-2010:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
          },
          {
            "name": "DSA-2143",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2143"
          },
          {
            "name": "43676",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43676"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640845"
          },
          {
            "name": "mysql-view-preparation-dos(64842)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64842"
          },
          {
            "name": "ADV-2011-0345",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0345"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=54568"
          },
          {
            "name": "RHSA-2010:0825",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
          },
          {
            "name": "MDVSA-2010:223",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4723"
        },
        {
          "name": "42875",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42875"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "APPLE-SA-2011-06-23-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
        },
        {
          "name": "TLSA-2011-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
        },
        {
          "name": "ADV-2011-0105",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0105"
        },
        {
          "name": "MDVSA-2010:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
        },
        {
          "name": "DSA-2143",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2143"
        },
        {
          "name": "43676",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43676"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640845"
        },
        {
          "name": "mysql-view-preparation-dos(64842)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64842"
        },
        {
          "name": "ADV-2011-0345",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0345"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=54568"
        },
        {
          "name": "RHSA-2010:0825",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
        },
        {
          "name": "MDVSA-2010:223",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3836",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "http://support.apple.com/kb/HT4723",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4723"
            },
            {
              "name": "42875",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42875"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "APPLE-SA-2011-06-23-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
            },
            {
              "name": "TLSA-2011-3",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
            },
            {
              "name": "ADV-2011-0105",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0105"
            },
            {
              "name": "MDVSA-2010:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
            },
            {
              "name": "DSA-2143",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2143"
            },
            {
              "name": "43676",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43676"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640845",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640845"
            },
            {
              "name": "mysql-view-preparation-dos(64842)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64842"
            },
            {
              "name": "ADV-2011-0345",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0345"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=54568",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=54568"
            },
            {
              "name": "RHSA-2010:0825",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
            },
            {
              "name": "MDVSA-2010:223",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3836",
    "datePublished": "2011-01-14T18:00:00",
    "dateReserved": "2010-10-07T00:00:00",
    "dateUpdated": "2024-08-07T03:26:11.437Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-4226
Vulnerability from cvelistv5
Published
2006-08-18 19:55
Modified
2024-08-07 18:57
Severity ?
Summary
MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
References
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/21627third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1016710vdb-entry, x_refsource_SECTRACK
http://www.redhat.com/support/errata/RHSA-2007-0152.htmlvendor-advisory, x_refsource_REDHAT
http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlthird-party-advisory, x_refsource_CERT
http://secunia.com/advisories/21762third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3306vdb-entry, x_refsource_VUPEN
http://www.novell.com/linux/security/advisories/2006_23_sr.htmlvendor-advisory, x_refsource_SUSE
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlvendor-advisory, x_refsource_APPLE
http://secunia.com/advisories/21506third-party-advisory, x_refsource_SECUNIA
http://docs.info.apple.com/article.html?artnum=305214x_refsource_CONFIRM
http://secunia.com/advisories/24744third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/19559vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/28448vdb-entry, x_refsource_XF
http://www.mandriva.com/security/advisories?name=MDKSA-2006:149vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/22080third-party-advisory, x_refsource_SECUNIA
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.htmlx_refsource_CONFIRM
http://bugs.mysql.com/bug.php?id=17647x_refsource_MISC
http://lists.mysql.com/commits/5927mailing-list, x_refsource_MLIST
http://www.debian.org/security/2006/dsa-1169vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2007/0930vdb-entry, x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2007-0083.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/24479third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:57:46.518Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:10729",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
          },
          {
            "name": "21627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21627"
          },
          {
            "name": "1016710",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016710"
          },
          {
            "name": "RHSA-2007:0152",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
          },
          {
            "name": "TA07-072A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
          },
          {
            "name": "21762",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21762"
          },
          {
            "name": "ADV-2006-3306",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3306"
          },
          {
            "name": "SUSE-SR:2006:023",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
          },
          {
            "name": "APPLE-SA-2007-03-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
          },
          {
            "name": "21506",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21506"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=305214"
          },
          {
            "name": "24744",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24744"
          },
          {
            "name": "19559",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19559"
          },
          {
            "name": "mysql-case-privilege-escalation(28448)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
          },
          {
            "name": "MDKSA-2006:149",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
          },
          {
            "name": "22080",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22080"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=17647"
          },
          {
            "name": "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/commits/5927"
          },
          {
            "name": "DSA-1169",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1169"
          },
          {
            "name": "ADV-2007-0930",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0930"
          },
          {
            "name": "RHSA-2007:0083",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
          },
          {
            "name": "24479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24479"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:10729",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
        },
        {
          "name": "21627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21627"
        },
        {
          "name": "1016710",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016710"
        },
        {
          "name": "RHSA-2007:0152",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
        },
        {
          "name": "TA07-072A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
        },
        {
          "name": "21762",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21762"
        },
        {
          "name": "ADV-2006-3306",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3306"
        },
        {
          "name": "SUSE-SR:2006:023",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
        },
        {
          "name": "APPLE-SA-2007-03-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
        },
        {
          "name": "21506",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21506"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=305214"
        },
        {
          "name": "24744",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24744"
        },
        {
          "name": "19559",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19559"
        },
        {
          "name": "mysql-case-privilege-escalation(28448)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
        },
        {
          "name": "MDKSA-2006:149",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
        },
        {
          "name": "22080",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22080"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=17647"
        },
        {
          "name": "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.mysql.com/commits/5927"
        },
        {
          "name": "DSA-1169",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1169"
        },
        {
          "name": "ADV-2007-0930",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0930"
        },
        {
          "name": "RHSA-2007:0083",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
        },
        {
          "name": "24479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24479"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4226",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "oval:org.mitre.oval:def:10729",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
            },
            {
              "name": "21627",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21627"
            },
            {
              "name": "1016710",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016710"
            },
            {
              "name": "RHSA-2007:0152",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
            },
            {
              "name": "TA07-072A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
            },
            {
              "name": "21762",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21762"
            },
            {
              "name": "ADV-2006-3306",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3306"
            },
            {
              "name": "SUSE-SR:2006:023",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
            },
            {
              "name": "APPLE-SA-2007-03-13",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
            },
            {
              "name": "21506",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21506"
            },
            {
              "name": "http://docs.info.apple.com/article.html?artnum=305214",
              "refsource": "CONFIRM",
              "url": "http://docs.info.apple.com/article.html?artnum=305214"
            },
            {
              "name": "24744",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24744"
            },
            {
              "name": "19559",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19559"
            },
            {
              "name": "mysql-case-privilege-escalation(28448)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
            },
            {
              "name": "MDKSA-2006:149",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
            },
            {
              "name": "22080",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22080"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=17647",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=17647"
            },
            {
              "name": "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)",
              "refsource": "MLIST",
              "url": "http://lists.mysql.com/commits/5927"
            },
            {
              "name": "DSA-1169",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1169"
            },
            {
              "name": "ADV-2007-0930",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0930"
            },
            {
              "name": "RHSA-2007:0083",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
            },
            {
              "name": "24479",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24479"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4226",
    "datePublished": "2006-08-18T19:55:00",
    "dateReserved": "2006-08-18T00:00:00",
    "dateUpdated": "2024-08-07T18:57:46.518Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0583
Vulnerability from cvelistv5
Published
2012-05-03 22:00
Modified
2024-08-06 18:30
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.60 and earlier, and 5.5.19 and earlier, allows remote authenticated users to affect availability, related to MyISAM.
References
http://www.securityfocus.com/bid/53061vdb-entry, x_refsource_BID
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://www.securitytracker.com/id?1026934vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/48890third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.htmlx_refsource_CONFIRM
http://secunia.com/advisories/49179third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:30:52.918Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "53061",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53061"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "1026934",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026934"
          },
          {
            "name": "48890",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48890"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
          },
          {
            "name": "49179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49179"
          },
          {
            "name": "MDVSA-2013:150",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.60 and earlier, and 5.5.19 and earlier, allows remote authenticated users to affect availability, related to MyISAM."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-06T21:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "53061",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53061"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "1026934",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026934"
        },
        {
          "name": "48890",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48890"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
        },
        {
          "name": "49179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49179"
        },
        {
          "name": "MDVSA-2013:150",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0583",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.60 and earlier, and 5.5.19 and earlier, allows remote authenticated users to affect availability, related to MyISAM."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "53061",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53061"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "1026934",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026934"
            },
            {
              "name": "48890",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48890"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
            },
            {
              "name": "49179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49179"
            },
            {
              "name": "MDVSA-2013:150",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0583",
    "datePublished": "2012-05-03T22:00:00",
    "dateReserved": "2012-01-11T00:00:00",
    "dateUpdated": "2024-08-06T18:30:52.918Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0882
Vulnerability from cvelistv5
Published
2012-12-21 02:00
Modified
2024-08-06 18:38
Severity ?
Summary
Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other versions including 5.5.x before 5.5.22 and 5.1.x before 5.1.62, allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VulnDisco Pack Professional 9.17. NOTE: as of 20120224, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. NOTE: due to lack of details, it is not clear whether this issue is a duplicate of CVE-2012-0492 or another CVE.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:14.959Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[Canvas] 20120223 VulnDisco MySQL 0day",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000014.html"
          },
          {
            "name": "[Canvas] 20120207 VulnDisco Pack Professional 9.17",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000011.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789141"
          },
          {
            "name": "[oss-security] 20120224 Re: MySQL 0-day - does it need a CVE?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/02/24/2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0882buffer_overflow_vulnerability"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other versions including 5.5.x before 5.5.22 and 5.1.x before 5.1.62, allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VulnDisco Pack Professional 9.17.  NOTE: as of 20120224, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.  NOTE: due to lack of details, it is not clear whether this issue is a duplicate of CVE-2012-0492 or another CVE."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-12-21T02:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[Canvas] 20120223 VulnDisco MySQL 0day",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000014.html"
        },
        {
          "name": "[Canvas] 20120207 VulnDisco Pack Professional 9.17",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000011.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789141"
        },
        {
          "name": "[oss-security] 20120224 Re: MySQL 0-day - does it need a CVE?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/02/24/2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0882buffer_overflow_vulnerability"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-0882",
    "datePublished": "2012-12-21T02:00:00Z",
    "dateReserved": "2012-01-19T00:00:00Z",
    "dateUpdated": "2024-08-06T18:38:14.959Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-2693
Vulnerability from cvelistv5
Published
2007-05-16 01:00
Modified
2024-08-07 13:49
Severity ?
Summary
MySQL before 5.1.18 allows remote authenticated users without SELECT privileges to obtain sensitive information from partitioned tables via an ALTER TABLE statement.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:49:57.302Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
          },
          {
            "name": "1018071",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018071"
          },
          {
            "name": "ADV-2007-1804",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1804"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=23675"
          },
          {
            "name": "mysql-alter-information-disclosure(34349)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34349"
          },
          {
            "name": "25301",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25301"
          },
          {
            "name": "24008",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24008"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-05-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL before 5.1.18 allows remote authenticated users without SELECT privileges to obtain sensitive information from partitioned tables via an ALTER TABLE statement."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
        },
        {
          "name": "1018071",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018071"
        },
        {
          "name": "ADV-2007-1804",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1804"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=23675"
        },
        {
          "name": "mysql-alter-information-disclosure(34349)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34349"
        },
        {
          "name": "25301",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25301"
        },
        {
          "name": "24008",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24008"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2693",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL before 5.1.18 allows remote authenticated users without SELECT privileges to obtain sensitive information from partitioned tables via an ALTER TABLE statement."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
            },
            {
              "name": "1018071",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018071"
            },
            {
              "name": "ADV-2007-1804",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1804"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=23675",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=23675"
            },
            {
              "name": "mysql-alter-information-disclosure(34349)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34349"
            },
            {
              "name": "25301",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25301"
            },
            {
              "name": "24008",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24008"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2693",
    "datePublished": "2007-05-16T01:00:00",
    "dateReserved": "2007-05-15T00:00:00",
    "dateUpdated": "2024-08-07T13:49:57.302Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3677
Vulnerability from cvelistv5
Published
2011-01-11 19:00
Modified
2024-08-07 03:18
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://support.apple.com/kb/HT4723x_refsource_CONFIRM
http://secunia.com/advisories/42875third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1017-1vendor-advisory, x_refsource_UBUNTU
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txtvendor-advisory, x_refsource_TURBO
http://www.mandriva.com/security/advisories?name=MDVSA-2011:012vendor-advisory, x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2011/0105vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:222vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2011-0164.htmlvendor-advisory, x_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilities/64688vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2011/0170vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0133vdb-entry, x_refsource_VUPEN
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.htmlx_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=628040x_refsource_CONFIRM
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.htmlx_refsource_CONFIRM
http://www.securityfocus.com/bid/42646vdb-entry, x_refsource_BID
http://www.debian.org/security/2011/dsa-2143vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2011/0345vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:155vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/42936third-party-advisory, x_refsource_SECUNIA
http://bugs.mysql.com/bug.php?id=54575x_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2010-0825.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.htmlvendor-advisory, x_refsource_SUSE
http://www.openwall.com/lists/oss-security/2010/09/28/10mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:18:51.984Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4723"
          },
          {
            "name": "42875",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42875"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "APPLE-SA-2011-06-23-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
          },
          {
            "name": "TLSA-2011-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
          },
          {
            "name": "MDVSA-2011:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
          },
          {
            "name": "ADV-2011-0105",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0105"
          },
          {
            "name": "MDVSA-2010:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "mysql-setcolumn-dos(64688)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "name": "ADV-2011-0133",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0133"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628040"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
          },
          {
            "name": "42646",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42646"
          },
          {
            "name": "DSA-2143",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2143"
          },
          {
            "name": "ADV-2011-0345",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0345"
          },
          {
            "name": "MDVSA-2010:155",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=54575"
          },
          {
            "name": "RHSA-2010:0825",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
          },
          {
            "name": "SUSE-SR:2010:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
          },
          {
            "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4723"
        },
        {
          "name": "42875",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42875"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "APPLE-SA-2011-06-23-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
        },
        {
          "name": "TLSA-2011-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
        },
        {
          "name": "MDVSA-2011:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
        },
        {
          "name": "ADV-2011-0105",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0105"
        },
        {
          "name": "MDVSA-2010:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "mysql-setcolumn-dos(64688)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "name": "ADV-2011-0133",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0133"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628040"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
        },
        {
          "name": "42646",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42646"
        },
        {
          "name": "DSA-2143",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2143"
        },
        {
          "name": "ADV-2011-0345",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0345"
        },
        {
          "name": "MDVSA-2010:155",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=54575"
        },
        {
          "name": "RHSA-2010:0825",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
        },
        {
          "name": "SUSE-SR:2010:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
        },
        {
          "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3677",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "http://support.apple.com/kb/HT4723",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4723"
            },
            {
              "name": "42875",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42875"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "APPLE-SA-2011-06-23-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
            },
            {
              "name": "TLSA-2011-3",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
            },
            {
              "name": "MDVSA-2011:012",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
            },
            {
              "name": "ADV-2011-0105",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0105"
            },
            {
              "name": "MDVSA-2010:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "mysql-setcolumn-dos(64688)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "ADV-2011-0133",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0133"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628040",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628040"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
            },
            {
              "name": "42646",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42646"
            },
            {
              "name": "DSA-2143",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2143"
            },
            {
              "name": "ADV-2011-0345",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0345"
            },
            {
              "name": "MDVSA-2010:155",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=54575",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=54575"
            },
            {
              "name": "RHSA-2010:0825",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
            },
            {
              "name": "SUSE-SR:2010:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
            },
            {
              "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3677",
    "datePublished": "2011-01-11T19:00:00",
    "dateReserved": "2010-09-28T00:00:00",
    "dateUpdated": "2024-08-07T03:18:51.984Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-15945
Vulnerability from cvelistv5
Published
2017-10-27 21:00
Modified
2024-08-05 20:13
Severity ?
Summary
The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link.
References
https://bugs.gentoo.org/630822x_refsource_CONFIRM
https://security.gentoo.org/glsa/201711-04vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:13:05.914Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.gentoo.org/630822"
          },
          {
            "name": "GLSA-201711-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201711-04"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-10-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-11T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.gentoo.org/630822"
        },
        {
          "name": "GLSA-201711-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201711-04"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-15945",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugs.gentoo.org/630822",
              "refsource": "CONFIRM",
              "url": "https://bugs.gentoo.org/630822"
            },
            {
              "name": "GLSA-201711-04",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201711-04"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-15945",
    "datePublished": "2017-10-27T21:00:00",
    "dateReserved": "2017-10-27T00:00:00",
    "dateUpdated": "2024-08-05T20:13:05.914Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-1420
Vulnerability from cvelistv5
Published
2007-03-12 23:00
Modified
2024-08-07 12:59
Severity ?
Summary
MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function.
References
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.htmlx_refsource_CONFIRM
http://secunia.com/advisories/25196third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24609third-party-advisory, x_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-1127x_refsource_CONFIRM
http://secunia.com/advisories/25389third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-440-1vendor-advisory, x_refsource_UBUNTU
http://security.gentoo.org/glsa/glsa-200705-11.xmlvendor-advisory, x_refsource_GENTOO
http://securityreason.com/securityalert/2413third-party-advisory, x_refsource_SREASON
http://secunia.com/advisories/25946third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/0908vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/462339/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/24483third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1017746vdb-entry, x_refsource_SECTRACK
http://www.sec-consult.com/284.htmlx_refsource_MISC
http://www.mandriva.com/security/advisories?name=MDKSA-2007:139vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/30351third-party-advisory, x_refsource_SECUNIA
http://bugs.mysql.com/bug.php?id=24630x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530vdb-entry, signature, x_refsource_OVAL
http://www.securityfocus.com/bid/22900vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2008-0364.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:59:06.997Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.html"
          },
          {
            "name": "25196",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25196"
          },
          {
            "name": "24609",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24609"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1127"
          },
          {
            "name": "25389",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25389"
          },
          {
            "name": "USN-440-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-440-1"
          },
          {
            "name": "GLSA-200705-11",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200705-11.xml"
          },
          {
            "name": "2413",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2413"
          },
          {
            "name": "25946",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25946"
          },
          {
            "name": "ADV-2007-0908",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0908"
          },
          {
            "name": "20070309 SEC Consult SA-20070309-0 :: MySQL 5 Single Row Subselect Denial of Service",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/462339/100/0/threaded"
          },
          {
            "name": "24483",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24483"
          },
          {
            "name": "1017746",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017746"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.sec-consult.com/284.html"
          },
          {
            "name": "MDKSA-2007:139",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139"
          },
          {
            "name": "30351",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30351"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=24630"
          },
          {
            "name": "oval:org.mitre.oval:def:9530",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530"
          },
          {
            "name": "22900",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22900"
          },
          {
            "name": "RHSA-2008:0364",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.html"
        },
        {
          "name": "25196",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25196"
        },
        {
          "name": "24609",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24609"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1127"
        },
        {
          "name": "25389",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25389"
        },
        {
          "name": "USN-440-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-440-1"
        },
        {
          "name": "GLSA-200705-11",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200705-11.xml"
        },
        {
          "name": "2413",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2413"
        },
        {
          "name": "25946",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25946"
        },
        {
          "name": "ADV-2007-0908",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0908"
        },
        {
          "name": "20070309 SEC Consult SA-20070309-0 :: MySQL 5 Single Row Subselect Denial of Service",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/462339/100/0/threaded"
        },
        {
          "name": "24483",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24483"
        },
        {
          "name": "1017746",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017746"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.sec-consult.com/284.html"
        },
        {
          "name": "MDKSA-2007:139",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139"
        },
        {
          "name": "30351",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30351"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=24630"
        },
        {
          "name": "oval:org.mitre.oval:def:9530",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530"
        },
        {
          "name": "22900",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22900"
        },
        {
          "name": "RHSA-2008:0364",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1420",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.html"
            },
            {
              "name": "25196",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25196"
            },
            {
              "name": "24609",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24609"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1127",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1127"
            },
            {
              "name": "25389",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25389"
            },
            {
              "name": "USN-440-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-440-1"
            },
            {
              "name": "GLSA-200705-11",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200705-11.xml"
            },
            {
              "name": "2413",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2413"
            },
            {
              "name": "25946",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25946"
            },
            {
              "name": "ADV-2007-0908",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0908"
            },
            {
              "name": "20070309 SEC Consult SA-20070309-0 :: MySQL 5 Single Row Subselect Denial of Service",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/462339/100/0/threaded"
            },
            {
              "name": "24483",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24483"
            },
            {
              "name": "1017746",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017746"
            },
            {
              "name": "http://www.sec-consult.com/284.html",
              "refsource": "MISC",
              "url": "http://www.sec-consult.com/284.html"
            },
            {
              "name": "MDKSA-2007:139",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139"
            },
            {
              "name": "30351",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30351"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=24630",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=24630"
            },
            {
              "name": "oval:org.mitre.oval:def:9530",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530"
            },
            {
              "name": "22900",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22900"
            },
            {
              "name": "RHSA-2008:0364",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1420",
    "datePublished": "2007-03-12T23:00:00",
    "dateReserved": "2007-03-12T00:00:00",
    "dateUpdated": "2024-08-07T12:59:06.997Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-2446
Vulnerability from cvelistv5
Published
2009-07-13 17:00
Modified
2024-08-07 05:52
Severity ?
Summary
Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request. NOTE: some of these details are obtained from third party information.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.htmlmailing-list, x_refsource_FULLDISC
http://www.securityfocus.com/archive/1/504799/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/38517third-party-advisory, x_refsource_SECUNIA
http://ubuntu.com/usn/usn-897-1vendor-advisory, x_refsource_UBUNTU
http://www.redhat.com/support/errata/RHSA-2009-1289.htmlvendor-advisory, x_refsource_REDHAT
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlvendor-advisory, x_refsource_APPLE
http://securitytracker.com/id?1022533vdb-entry, x_refsource_SECTRACK
http://www.osvdb.org/55734vdb-entry, x_refsource_OSVDB
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857vdb-entry, signature, x_refsource_OVAL
http://www.vupen.com/english/advisories/2009/1857vdb-entry, x_refsource_VUPEN
http://support.apple.com/kb/HT4077x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/51614vdb-entry, x_refsource_XF
http://www.mandriva.com/security/advisories?name=MDVSA-2009:179vendor-advisory, x_refsource_MANDRIVA
http://www.securityfocus.com/bid/35609vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2010-0110.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/35767third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/36566third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:52:14.762Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "20090708 MySQL \u003c= 5.0.45 post auth format string vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html"
          },
          {
            "name": "20090708 MySQL \u003c= 5.0.45 post auth format string vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/504799/100/0/threaded"
          },
          {
            "name": "38517",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38517"
          },
          {
            "name": "USN-897-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-897-1"
          },
          {
            "name": "RHSA-2009:1289",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
          },
          {
            "name": "APPLE-SA-2010-03-29-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
          },
          {
            "name": "1022533",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1022533"
          },
          {
            "name": "55734",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55734"
          },
          {
            "name": "oval:org.mitre.oval:def:11857",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857"
          },
          {
            "name": "ADV-2009-1857",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1857"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4077"
          },
          {
            "name": "mysql-dispatchcommand-format-string(51614)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51614"
          },
          {
            "name": "MDVSA-2009:179",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:179"
          },
          {
            "name": "35609",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35609"
          },
          {
            "name": "RHSA-2010:0110",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
          },
          {
            "name": "35767",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35767"
          },
          {
            "name": "36566",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36566"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "20090708 MySQL \u003c= 5.0.45 post auth format string vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html"
        },
        {
          "name": "20090708 MySQL \u003c= 5.0.45 post auth format string vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/504799/100/0/threaded"
        },
        {
          "name": "38517",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38517"
        },
        {
          "name": "USN-897-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-897-1"
        },
        {
          "name": "RHSA-2009:1289",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
        },
        {
          "name": "APPLE-SA-2010-03-29-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
        },
        {
          "name": "1022533",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1022533"
        },
        {
          "name": "55734",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55734"
        },
        {
          "name": "oval:org.mitre.oval:def:11857",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857"
        },
        {
          "name": "ADV-2009-1857",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1857"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4077"
        },
        {
          "name": "mysql-dispatchcommand-format-string(51614)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51614"
        },
        {
          "name": "MDVSA-2009:179",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:179"
        },
        {
          "name": "35609",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35609"
        },
        {
          "name": "RHSA-2010:0110",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
        },
        {
          "name": "35767",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35767"
        },
        {
          "name": "36566",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36566"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2446",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "20090708 MySQL \u003c= 5.0.45 post auth format string vulnerability",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html"
            },
            {
              "name": "20090708 MySQL \u003c= 5.0.45 post auth format string vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/504799/100/0/threaded"
            },
            {
              "name": "38517",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38517"
            },
            {
              "name": "USN-897-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-897-1"
            },
            {
              "name": "RHSA-2009:1289",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
            },
            {
              "name": "APPLE-SA-2010-03-29-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
            },
            {
              "name": "1022533",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1022533"
            },
            {
              "name": "55734",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55734"
            },
            {
              "name": "oval:org.mitre.oval:def:11857",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857"
            },
            {
              "name": "ADV-2009-1857",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1857"
            },
            {
              "name": "http://support.apple.com/kb/HT4077",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4077"
            },
            {
              "name": "mysql-dispatchcommand-format-string(51614)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51614"
            },
            {
              "name": "MDVSA-2009:179",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:179"
            },
            {
              "name": "35609",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35609"
            },
            {
              "name": "RHSA-2010:0110",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
            },
            {
              "name": "35767",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35767"
            },
            {
              "name": "36566",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36566"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2446",
    "datePublished": "2009-07-13T17:00:00",
    "dateReserved": "2009-07-13T00:00:00",
    "dateUpdated": "2024-08-07T05:52:14.762Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-7232
Vulnerability from cvelistv5
Published
2008-02-26 18:00
Modified
2024-08-07 20:57
Severity ?
Summary
sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:57:40.500Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SR:2008:017",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html"
          },
          {
            "name": "29443",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29443"
          },
          {
            "name": "oval:org.mitre.oval:def:11720",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720"
          },
          {
            "name": "31687",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31687"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=22413"
          },
          {
            "name": "28351",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28351"
          },
          {
            "name": "30351",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30351"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html"
          },
          {
            "name": "USN-588-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-588-1"
          },
          {
            "name": "RHSA-2008:0364",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-11-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SUSE-SR:2008:017",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html"
        },
        {
          "name": "29443",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29443"
        },
        {
          "name": "oval:org.mitre.oval:def:11720",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720"
        },
        {
          "name": "31687",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31687"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=22413"
        },
        {
          "name": "28351",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28351"
        },
        {
          "name": "30351",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30351"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html"
        },
        {
          "name": "USN-588-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-588-1"
        },
        {
          "name": "RHSA-2008:0364",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-7232",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SR:2008:017",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html"
            },
            {
              "name": "29443",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29443"
            },
            {
              "name": "oval:org.mitre.oval:def:11720",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720"
            },
            {
              "name": "31687",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31687"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=22413",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=22413"
            },
            {
              "name": "28351",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28351"
            },
            {
              "name": "30351",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30351"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html"
            },
            {
              "name": "USN-588-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-588-1"
            },
            {
              "name": "RHSA-2008:0364",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-7232",
    "datePublished": "2008-02-26T18:00:00",
    "dateReserved": "2008-02-26T00:00:00",
    "dateUpdated": "2024-08-07T20:57:40.500Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0102
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:16
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0101.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/72521vdb-entry, x_refsource_XF
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://osvdb.org/78379vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.htmlvendor-advisory, x_refsource_SUSE
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.491Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mysql-serveruns2-dos(72521)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "78379",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/78379"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "name": "SUSE-SU-2012:0984",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0101."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "mysql-serveruns2-dos(72521)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "78379",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/78379"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "name": "SUSE-SU-2012:0984",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0102",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0101."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mysql-serveruns2-dos(72521)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "78379",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/78379"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "SUSE-SU-2012:0984",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0102",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-12-12T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.491Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-6304
Vulnerability from cvelistv5
Published
2007-12-10 21:00
Modified
2024-08-07 16:02
Severity ?
Summary
The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
References
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040x_refsource_CONFIRM
http://secunia.com/advisories/28343third-party-advisory, x_refsource_SECUNIA
http://lists.mysql.com/announce/502x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200804-04.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/29706third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/42609vdb-entry, x_refsource_OSVDB
http://www.mandriva.com/security/advisories?name=MDVSA-2008:028vendor-advisory, x_refsource_MANDRIVA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:017vendor-advisory, x_refsource_MANDRIVA
https://issues.rpath.com/browse/RPL-2187x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1451vendor-advisory, x_refsource_DEBIAN
https://usn.ubuntu.com/559-1/vendor-advisory, x_refsource_UBUNTU
http://bugs.mysql.com/bug.php?id=29801x_refsource_CONFIRM
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.htmlx_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/4198vdb-entry, x_refsource_VUPEN
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.htmlx_refsource_CONFIRM
http://secunia.com/advisories/28637third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/26832vdb-entry, x_refsource_BID
http://securitytracker.com/id?1019085vdb-entry, x_refsource_SECTRACK
http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.htmlx_refsource_CONFIRM
http://www.securityfocus.com/archive/1/487606/100/0/threadedmailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/38990vdb-entry, x_refsource_XF
http://secunia.com/advisories/28838third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28128third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28063third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/28739third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:02:36.285Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040"
          },
          {
            "name": "28343",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28343"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/announce/502"
          },
          {
            "name": "GLSA-200804-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml"
          },
          {
            "name": "29706",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29706"
          },
          {
            "name": "42609",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42609"
          },
          {
            "name": "MDVSA-2008:028",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028"
          },
          {
            "name": "MDVSA-2008:017",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2187"
          },
          {
            "name": "DSA-1451",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1451"
          },
          {
            "name": "USN-559-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/559-1/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=29801"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
          },
          {
            "name": "ADV-2007-4198",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4198"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html"
          },
          {
            "name": "28637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28637"
          },
          {
            "name": "26832",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26832"
          },
          {
            "name": "1019085",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1019085"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html"
          },
          {
            "name": "20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded"
          },
          {
            "name": "mysql-federated-engine-dos(38990)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38990"
          },
          {
            "name": "28838",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28838"
          },
          {
            "name": "28128",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28128"
          },
          {
            "name": "28063",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28063"
          },
          {
            "name": "SUSE-SR:2008:003",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
          },
          {
            "name": "28739",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28739"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-12-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040"
        },
        {
          "name": "28343",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28343"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://lists.mysql.com/announce/502"
        },
        {
          "name": "GLSA-200804-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml"
        },
        {
          "name": "29706",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29706"
        },
        {
          "name": "42609",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42609"
        },
        {
          "name": "MDVSA-2008:028",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028"
        },
        {
          "name": "MDVSA-2008:017",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2187"
        },
        {
          "name": "DSA-1451",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1451"
        },
        {
          "name": "USN-559-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/559-1/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=29801"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
        },
        {
          "name": "ADV-2007-4198",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4198"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html"
        },
        {
          "name": "28637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28637"
        },
        {
          "name": "26832",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26832"
        },
        {
          "name": "1019085",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1019085"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html"
        },
        {
          "name": "20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded"
        },
        {
          "name": "mysql-federated-engine-dos(38990)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38990"
        },
        {
          "name": "28838",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28838"
        },
        {
          "name": "28128",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28128"
        },
        {
          "name": "28063",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28063"
        },
        {
          "name": "SUSE-SR:2008:003",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
        },
        {
          "name": "28739",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28739"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6304",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040"
            },
            {
              "name": "28343",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28343"
            },
            {
              "name": "http://lists.mysql.com/announce/502",
              "refsource": "CONFIRM",
              "url": "http://lists.mysql.com/announce/502"
            },
            {
              "name": "GLSA-200804-04",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml"
            },
            {
              "name": "29706",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29706"
            },
            {
              "name": "42609",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42609"
            },
            {
              "name": "MDVSA-2008:028",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028"
            },
            {
              "name": "MDVSA-2008:017",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2187",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2187"
            },
            {
              "name": "DSA-1451",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1451"
            },
            {
              "name": "USN-559-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/559-1/"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=29801",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=29801"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
            },
            {
              "name": "ADV-2007-4198",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4198"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html"
            },
            {
              "name": "28637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28637"
            },
            {
              "name": "26832",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26832"
            },
            {
              "name": "1019085",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1019085"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html"
            },
            {
              "name": "20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded"
            },
            {
              "name": "mysql-federated-engine-dos(38990)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38990"
            },
            {
              "name": "28838",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28838"
            },
            {
              "name": "28128",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28128"
            },
            {
              "name": "28063",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28063"
            },
            {
              "name": "SUSE-SR:2008:003",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
            },
            {
              "name": "28739",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28739"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6304",
    "datePublished": "2007-12-10T21:00:00",
    "dateReserved": "2007-12-10T00:00:00",
    "dateUpdated": "2024-08-07T16:02:36.285Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-3486
Vulnerability from cvelistv5
Published
2006-07-10 21:00
Modified
2024-08-07 18:30
Severity ?
Summary
Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called. NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon. Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:30:34.268Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mysql-instancemanager-dos(27635)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27635"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=20622"
          },
          {
            "name": "ADV-2006-2700",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2700"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called.  NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon.  Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "mysql-instancemanager-dos(27635)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27635"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=20622"
        },
        {
          "name": "ADV-2006-2700",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2700"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3486",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED **  Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called.  NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon.  Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mysql-instancemanager-dos(27635)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27635"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html",
              "refsource": "MISC",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html",
              "refsource": "MISC",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=20622",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=20622"
            },
            {
              "name": "ADV-2006-2700",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2700"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3486",
    "datePublished": "2006-07-10T21:00:00",
    "dateReserved": "2006-07-10T00:00:00",
    "dateUpdated": "2024-08-07T18:30:34.268Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-1492
Vulnerability from cvelistv5
Published
2013-03-28 23:00
Modified
2024-08-06 15:04
Severity ?
Summary
Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:04:49.098Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "52445",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/52445"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-02-10T22:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "52445",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/52445"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2013-1492",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html",
              "refsource": "MISC",
              "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "52445",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/52445"
            },
            {
              "name": "http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html",
              "refsource": "MISC",
              "url": "http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow",
              "refsource": "CONFIRM",
              "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2013-1492",
    "datePublished": "2013-03-28T23:00:00",
    "dateReserved": "2013-01-30T00:00:00",
    "dateUpdated": "2024-08-06T15:04:49.098Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-0628
Vulnerability from cvelistv5
Published
2004-07-08 04:00
Modified
2024-08-08 00:24
Severity ?
Summary
Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string.
References
http://marc.info/?l=bugtraq&m=108904917528205&w=2mailing-list, x_refsource_BUGTRAQ
http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.htmlmailing-list, x_refsource_VULNWATCH
http://www.kb.cert.org/vuls/id/645326third-party-advisory, x_refsource_CERT-VN
https://exchange.xforce.ibmcloud.com/vulnerabilities/16612vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:24:26.959Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20040705 MySQL Authentication Bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2"
          },
          {
            "name": "20040705 MySQL Authentication Bypass",
            "tags": [
              "mailing-list",
              "x_refsource_VULNWATCH",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html"
          },
          {
            "name": "VU#645326",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/645326"
          },
          {
            "name": "mysql-myrnd-bo(16612)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16612"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-07-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20040705 MySQL Authentication Bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2"
        },
        {
          "name": "20040705 MySQL Authentication Bypass",
          "tags": [
            "mailing-list",
            "x_refsource_VULNWATCH"
          ],
          "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html"
        },
        {
          "name": "VU#645326",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/645326"
        },
        {
          "name": "mysql-myrnd-bo(16612)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16612"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0628",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20040705 MySQL Authentication Bypass",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2"
            },
            {
              "name": "20040705 MySQL Authentication Bypass",
              "refsource": "VULNWATCH",
              "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html"
            },
            {
              "name": "VU#645326",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/645326"
            },
            {
              "name": "mysql-myrnd-bo(16612)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16612"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0628",
    "datePublished": "2004-07-08T04:00:00",
    "dateReserved": "2004-07-06T00:00:00",
    "dateUpdated": "2024-08-08T00:24:26.959Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-1850
Vulnerability from cvelistv5
Published
2010-06-07 20:00
Modified
2024-08-07 01:35
Severity ?
Summary
Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:35:53.857Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1024033",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1024033"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4435"
          },
          {
            "name": "APPLE-SA-2010-11-10-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
          },
          {
            "name": "oval:org.mitre.oval:def:6693",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6693"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
          },
          {
            "name": "oval:org.mitre.oval:def:10846",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10846"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
          },
          {
            "name": "RHSA-2010:0442",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=53237"
          },
          {
            "name": "MDVSA-2010:107",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
          },
          {
            "name": "SUSE-SR:2010:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1024033",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1024033"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4435"
        },
        {
          "name": "APPLE-SA-2010-11-10-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
        },
        {
          "name": "oval:org.mitre.oval:def:6693",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6693"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
        },
        {
          "name": "oval:org.mitre.oval:def:10846",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10846"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
        },
        {
          "name": "RHSA-2010:0442",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=53237"
        },
        {
          "name": "MDVSA-2010:107",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
        },
        {
          "name": "SUSE-SR:2010:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-1850",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1024033",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1024033"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "http://support.apple.com/kb/HT4435",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4435"
            },
            {
              "name": "APPLE-SA-2010-11-10-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
            },
            {
              "name": "oval:org.mitre.oval:def:6693",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6693"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
            },
            {
              "name": "oval:org.mitre.oval:def:10846",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10846"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
            },
            {
              "name": "RHSA-2010:0442",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=53237",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=53237"
            },
            {
              "name": "MDVSA-2010:107",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
            },
            {
              "name": "SUSE-SR:2010:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-1850",
    "datePublished": "2010-06-07T20:00:00",
    "dateReserved": "2010-05-06T00:00:00",
    "dateUpdated": "2024-08-07T01:35:53.857Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-2262
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 22:53
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote attackers to affect availability via unknown vectors.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:53:17.478Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote attackers to affect availability via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2011-2262",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote attackers to affect availability via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2011-2262",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-06-02T00:00:00",
    "dateUpdated": "2024-08-06T22:53:17.478Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-4098
Vulnerability from cvelistv5
Published
2008-09-17 18:06
Modified
2024-08-07 10:00
Severity ?
Summary
MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.
References
http://www.mandriva.com/security/advisories?name=MDVSA-2009:094vendor-advisory, x_refsource_MANDRIVA
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://www.redhat.com/support/errata/RHSA-2009-1067.htmlvendor-advisory, x_refsource_REDHAT
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25x_refsource_MISC
http://www.ubuntu.com/usn/USN-671-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/38517third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591vdb-entry, signature, x_refsource_OVAL
http://ubuntu.com/usn/usn-897-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/32769third-party-advisory, x_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2008/09/09/20mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2008/09/16/3mailing-list, x_refsource_MLIST
http://secunia.com/advisories/32759third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/45649vdb-entry, x_refsource_XF
http://www.debian.org/security/2008/dsa-1662vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2010-0110.htmlvendor-advisory, x_refsource_REDHAT
http://bugs.mysql.com/bug.php?id=32167x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/32578third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:00:42.841Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2009:094",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "RHSA-2009:1067",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25"
          },
          {
            "name": "USN-671-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-671-1"
          },
          {
            "name": "38517",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38517"
          },
          {
            "name": "oval:org.mitre.oval:def:10591",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591"
          },
          {
            "name": "USN-897-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-897-1"
          },
          {
            "name": "32769",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32769"
          },
          {
            "name": "[oss-security] 20080909 Re: CVE request: MySQL incomplete fix for CVE-2008-2079",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/09/09/20"
          },
          {
            "name": "[oss-security] 20080916 Re: CVE request: MySQL incomplete fix for CVE-2008-2079",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/09/16/3"
          },
          {
            "name": "32759",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32759"
          },
          {
            "name": "mysql-myisam-symlink-security-bypass(45649)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45649"
          },
          {
            "name": "DSA-1662",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1662"
          },
          {
            "name": "RHSA-2010:0110",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=32167"
          },
          {
            "name": "SUSE-SR:2008:025",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
          },
          {
            "name": "32578",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32578"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-09-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "MDVSA-2009:094",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "RHSA-2009:1067",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25"
        },
        {
          "name": "USN-671-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-671-1"
        },
        {
          "name": "38517",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38517"
        },
        {
          "name": "oval:org.mitre.oval:def:10591",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591"
        },
        {
          "name": "USN-897-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-897-1"
        },
        {
          "name": "32769",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32769"
        },
        {
          "name": "[oss-security] 20080909 Re: CVE request: MySQL incomplete fix for CVE-2008-2079",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/09/09/20"
        },
        {
          "name": "[oss-security] 20080916 Re: CVE request: MySQL incomplete fix for CVE-2008-2079",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/09/16/3"
        },
        {
          "name": "32759",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32759"
        },
        {
          "name": "mysql-myisam-symlink-security-bypass(45649)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45649"
        },
        {
          "name": "DSA-1662",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1662"
        },
        {
          "name": "RHSA-2010:0110",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=32167"
        },
        {
          "name": "SUSE-SR:2008:025",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
        },
        {
          "name": "32578",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32578"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-4098",
    "datePublished": "2008-09-17T18:06:00",
    "dateReserved": "2008-09-15T00:00:00",
    "dateUpdated": "2024-08-07T10:00:42.841Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3840
Vulnerability from cvelistv5
Published
2011-01-14 18:00
Modified
2024-08-07 03:26
Severity ?
Summary
The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points.
References
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.htmlx_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/42875third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0824.htmlvendor-advisory, x_refsource_REDHAT
http://bugs.mysql.com/bug.php?id=51875x_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-1017-1vendor-advisory, x_refsource_UBUNTU
http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txtvendor-advisory, x_refsource_TURBO
http://www.vupen.com/english/advisories/2011/0105vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:222vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2011-0164.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0170vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2011/dsa-2143vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/43676vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2011/0345vdb-entry, x_refsource_VUPEN
https://bugzilla.redhat.com/show_bug.cgi?id=640865x_refsource_CONFIRM
http://secunia.com/advisories/42936third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0825.htmlvendor-advisory, x_refsource_REDHAT
http://lists.mysql.com/commits/117094x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/64838vdb-entry, x_refsource_XF
http://www.mandriva.com/security/advisories?name=MDVSA-2010:223vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:26:11.559Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "42875",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42875"
          },
          {
            "name": "RHSA-2010:0824",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=51875"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "TLSA-2011-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
          },
          {
            "name": "ADV-2011-0105",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0105"
          },
          {
            "name": "MDVSA-2010:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "name": "DSA-2143",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2143"
          },
          {
            "name": "43676",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43676"
          },
          {
            "name": "ADV-2011-0345",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0345"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640865"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "name": "RHSA-2010:0825",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/commits/117094"
          },
          {
            "name": "mysql-gislinestringinitfromwkb-dos(64838)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64838"
          },
          {
            "name": "MDVSA-2010:223",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "42875",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42875"
        },
        {
          "name": "RHSA-2010:0824",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=51875"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "TLSA-2011-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
        },
        {
          "name": "ADV-2011-0105",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0105"
        },
        {
          "name": "MDVSA-2010:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "name": "DSA-2143",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2143"
        },
        {
          "name": "43676",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43676"
        },
        {
          "name": "ADV-2011-0345",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0345"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640865"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "name": "RHSA-2010:0825",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.mysql.com/commits/117094"
        },
        {
          "name": "mysql-gislinestringinitfromwkb-dos(64838)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64838"
        },
        {
          "name": "MDVSA-2010:223",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3840",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "42875",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42875"
            },
            {
              "name": "RHSA-2010:0824",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=51875",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=51875"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "TLSA-2011-3",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
            },
            {
              "name": "ADV-2011-0105",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0105"
            },
            {
              "name": "MDVSA-2010:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "DSA-2143",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2143"
            },
            {
              "name": "43676",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43676"
            },
            {
              "name": "ADV-2011-0345",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0345"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640865",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640865"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "RHSA-2010:0825",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
            },
            {
              "name": "http://lists.mysql.com/commits/117094",
              "refsource": "MISC",
              "url": "http://lists.mysql.com/commits/117094"
            },
            {
              "name": "mysql-gislinestringinitfromwkb-dos(64838)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64838"
            },
            {
              "name": "MDVSA-2010:223",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3840",
    "datePublished": "2011-01-14T18:00:00",
    "dateReserved": "2010-10-07T00:00:00",
    "dateUpdated": "2024-08-07T03:26:11.559Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0113
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:16
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.687Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0113",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0113",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-12-12T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.687Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0075
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:16
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://osvdb.org/78374vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/72539vdb-entry, x_refsource_XF
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/51526vdb-entry, x_refsource_BID
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.htmlvendor-advisory, x_refsource_SUSE
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.510Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "78374",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/78374"
          },
          {
            "name": "mysql-server-cve20120075(72539)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72539"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "51526",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51526"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "name": "SUSE-SU-2012:0984",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "78374",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/78374"
        },
        {
          "name": "mysql-server-cve20120075(72539)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72539"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "51526",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51526"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "name": "SUSE-SU-2012:0984",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0075",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "78374",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/78374"
            },
            {
              "name": "mysql-server-cve20120075(72539)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72539"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "51526",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51526"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "SUSE-SU-2012:0984",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0075",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-12-12T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.510Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3838
Vulnerability from cvelistv5
Published
2011-01-14 18:00
Modified
2024-08-07 03:26
Severity ?
Summary
MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function's result is "processed using an intermediate temporary table."
References
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.htmlx_refsource_CONFIRM
http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.htmlx_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
https://exchange.xforce.ibmcloud.com/vulnerabilities/64840vdb-entry, x_refsource_XF
http://support.apple.com/kb/HT4723x_refsource_CONFIRM
http://secunia.com/advisories/42875third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1017-1vendor-advisory, x_refsource_UBUNTU
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txtvendor-advisory, x_refsource_TURBO
http://www.vupen.com/english/advisories/2011/0105vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:222vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2011-0164.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0170vdb-entry, x_refsource_VUPEN
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.htmlx_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2143vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/43676vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2011/0345vdb-entry, x_refsource_VUPEN
https://bugzilla.redhat.com/show_bug.cgi?id=640858x_refsource_CONFIRM
http://secunia.com/advisories/42936third-party-advisory, x_refsource_SECUNIA
http://bugs.mysql.com/bug.php?id=54461x_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2010-0825.htmlvendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDVSA-2010:223vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:26:11.936Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "mysql-longblob-dos(64840)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64840"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4723"
          },
          {
            "name": "42875",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42875"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "APPLE-SA-2011-06-23-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
          },
          {
            "name": "TLSA-2011-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
          },
          {
            "name": "ADV-2011-0105",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0105"
          },
          {
            "name": "MDVSA-2010:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
          },
          {
            "name": "DSA-2143",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2143"
          },
          {
            "name": "43676",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43676"
          },
          {
            "name": "ADV-2011-0345",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0345"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640858"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=54461"
          },
          {
            "name": "RHSA-2010:0825",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
          },
          {
            "name": "MDVSA-2010:223",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function\u0027s result is \"processed using an intermediate temporary table.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "mysql-longblob-dos(64840)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64840"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4723"
        },
        {
          "name": "42875",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42875"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "APPLE-SA-2011-06-23-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
        },
        {
          "name": "TLSA-2011-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
        },
        {
          "name": "ADV-2011-0105",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0105"
        },
        {
          "name": "MDVSA-2010:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
        },
        {
          "name": "DSA-2143",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2143"
        },
        {
          "name": "43676",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43676"
        },
        {
          "name": "ADV-2011-0345",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0345"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640858"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=54461"
        },
        {
          "name": "RHSA-2010:0825",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
        },
        {
          "name": "MDVSA-2010:223",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3838",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function\u0027s result is \"processed using an intermediate temporary table.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "mysql-longblob-dos(64840)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64840"
            },
            {
              "name": "http://support.apple.com/kb/HT4723",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4723"
            },
            {
              "name": "42875",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42875"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "APPLE-SA-2011-06-23-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
            },
            {
              "name": "TLSA-2011-3",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
            },
            {
              "name": "ADV-2011-0105",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0105"
            },
            {
              "name": "MDVSA-2010:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
            },
            {
              "name": "DSA-2143",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2143"
            },
            {
              "name": "43676",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43676"
            },
            {
              "name": "ADV-2011-0345",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0345"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640858",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640858"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=54461",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=54461"
            },
            {
              "name": "RHSA-2010:0825",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
            },
            {
              "name": "MDVSA-2010:223",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3838",
    "datePublished": "2011-01-14T18:00:00",
    "dateReserved": "2010-10-07T00:00:00",
    "dateUpdated": "2024-08-07T03:26:11.936Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2749
Vulnerability from cvelistv5
Published
2012-08-17 00:00
Modified
2024-08-06 19:42
Severity ?
Summary
MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index.
References
http://rhn.redhat.com/errata/RHSA-2012-1462.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2013-0180.htmlvendor-advisory, x_refsource_REDHAT
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
https://bugzilla.redhat.com/show_bug.cgi?id=833737x_refsource_CONFIRM
http://secunia.com/advisories/51309third-party-advisory, x_refsource_SECUNIA
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.htmlx_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150vendor-advisory, x_refsource_MANDRIVA
http://www.securityfocus.com/bid/55120vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.458Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2012:1462",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "RHSA-2013:0180",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737"
          },
          {
            "name": "51309",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51309"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html"
          },
          {
            "name": "MDVSA-2013:150",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
          },
          {
            "name": "55120",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55120"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-06-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-02-10T22:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2012:1462",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "RHSA-2013:0180",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737"
        },
        {
          "name": "51309",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51309"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html"
        },
        {
          "name": "MDVSA-2013:150",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
        },
        {
          "name": "55120",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55120"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-2749",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2012:1462",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "RHSA-2013:0180",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=833737",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737"
            },
            {
              "name": "51309",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51309"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html"
            },
            {
              "name": "MDVSA-2013:150",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
            },
            {
              "name": "55120",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55120"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2749",
    "datePublished": "2012-08-17T00:00:00",
    "dateReserved": "2012-05-14T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.458Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-4028
Vulnerability from cvelistv5
Published
2009-11-30 17:00
Modified
2024-08-07 06:45
Severity ?
Summary
The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:45:50.954Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:8510",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510"
          },
          {
            "name": "RHSA-2010:0109",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html"
          },
          {
            "name": "ADV-2010-1107",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1107"
          },
          {
            "name": "SUSE-SR:2010:011",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
          },
          {
            "name": "[oss-security] 20091119 mysql-5.1.41",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3"
          },
          {
            "name": "[commits] 20091020 bzr commit into mysql-4.1 branch (joro:2709) Bug#47320",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/commits/87446"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html"
          },
          {
            "name": "[oss-security] 20091121 CVE Request - MySQL - 5.0.88",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2"
          },
          {
            "name": "oval:org.mitre.oval:def:10940",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/47320"
          },
          {
            "name": "[oss-security] 20091123 Re: mysql-5.1.41",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/11/23/16"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:8510",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510"
        },
        {
          "name": "RHSA-2010:0109",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html"
        },
        {
          "name": "ADV-2010-1107",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1107"
        },
        {
          "name": "SUSE-SR:2010:011",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
        },
        {
          "name": "[oss-security] 20091119 mysql-5.1.41",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3"
        },
        {
          "name": "[commits] 20091020 bzr commit into mysql-4.1 branch (joro:2709) Bug#47320",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.mysql.com/commits/87446"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html"
        },
        {
          "name": "[oss-security] 20091121 CVE Request - MySQL - 5.0.88",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2"
        },
        {
          "name": "oval:org.mitre.oval:def:10940",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/47320"
        },
        {
          "name": "[oss-security] 20091123 Re: mysql-5.1.41",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/11/23/16"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-4028",
    "datePublished": "2009-11-30T17:00:00",
    "dateReserved": "2009-11-20T00:00:00",
    "dateUpdated": "2024-08-07T06:45:50.954Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-2079
Vulnerability from cvelistv5
Published
2008-05-05 16:00
Modified
2024-08-07 08:49
Severity ?
Summary
MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
References
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.htmlx_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.htmlvendor-advisory, x_refsource_SUSE
http://www.ubuntu.com/usn/USN-671-1vendor-advisory, x_refsource_UBUNTU
https://exchange.xforce.ibmcloud.com/vulnerabilities/42267vdb-entry, x_refsource_XF
http://www.securitytracker.com/id?1019995vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/31681vdb-entry, x_refsource_BID
http://secunia.com/advisories/31687third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/31226third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2009-1289.htmlvendor-advisory, x_refsource_REDHAT
http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.htmlx_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2008-0768.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/30134third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/32769third-party-advisory, x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.htmlvendor-advisory, x_refsource_APPLE
http://www.mandriva.com/security/advisories?name=MDVSA-2008:149vendor-advisory, x_refsource_MANDRIVA
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.htmlx_refsource_CONFIRM
http://secunia.com/advisories/32222third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1472/referencesvdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/31066third-party-advisory, x_refsource_SECUNIA
http://support.apple.com/kb/HT3865x_refsource_CONFIRM
http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.htmlx_refsource_CONFIRM
http://secunia.com/advisories/36701third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0505.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2008/2780vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/29106vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2008-0510.htmlvendor-advisory, x_refsource_REDHAT
http://bugs.mysql.com/bug.php?id=32167x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2008:150vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2008/dsa-1608vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/36566third-party-advisory, x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlvendor-advisory, x_refsource_APPLE
http://support.apple.com/kb/HT3216x_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:49:57.795Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html"
          },
          {
            "name": "SUSE-SR:2008:017",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
          },
          {
            "name": "USN-671-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-671-1"
          },
          {
            "name": "mysql-myisam-security-bypass(42267)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267"
          },
          {
            "name": "1019995",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019995"
          },
          {
            "name": "31681",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31681"
          },
          {
            "name": "31687",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31687"
          },
          {
            "name": "oval:org.mitre.oval:def:10133",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133"
          },
          {
            "name": "31226",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31226"
          },
          {
            "name": "RHSA-2009:1289",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html"
          },
          {
            "name": "RHSA-2008:0768",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
          },
          {
            "name": "30134",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30134"
          },
          {
            "name": "32769",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32769"
          },
          {
            "name": "APPLE-SA-2009-09-10-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"
          },
          {
            "name": "MDVSA-2008:149",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html"
          },
          {
            "name": "32222",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32222"
          },
          {
            "name": "ADV-2008-1472",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1472/references"
          },
          {
            "name": "31066",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31066"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3865"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html"
          },
          {
            "name": "36701",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36701"
          },
          {
            "name": "RHSA-2008:0505",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0505.html"
          },
          {
            "name": "ADV-2008-2780",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2780"
          },
          {
            "name": "29106",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29106"
          },
          {
            "name": "RHSA-2008:0510",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0510.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=32167"
          },
          {
            "name": "MDVSA-2008:150",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150"
          },
          {
            "name": "DSA-1608",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1608"
          },
          {
            "name": "36566",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36566"
          },
          {
            "name": "APPLE-SA-2008-10-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3216"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html"
        },
        {
          "name": "SUSE-SR:2008:017",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
        },
        {
          "name": "USN-671-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-671-1"
        },
        {
          "name": "mysql-myisam-security-bypass(42267)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267"
        },
        {
          "name": "1019995",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019995"
        },
        {
          "name": "31681",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31681"
        },
        {
          "name": "31687",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31687"
        },
        {
          "name": "oval:org.mitre.oval:def:10133",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133"
        },
        {
          "name": "31226",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31226"
        },
        {
          "name": "RHSA-2009:1289",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html"
        },
        {
          "name": "RHSA-2008:0768",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
        },
        {
          "name": "30134",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30134"
        },
        {
          "name": "32769",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32769"
        },
        {
          "name": "APPLE-SA-2009-09-10-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"
        },
        {
          "name": "MDVSA-2008:149",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html"
        },
        {
          "name": "32222",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32222"
        },
        {
          "name": "ADV-2008-1472",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1472/references"
        },
        {
          "name": "31066",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31066"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3865"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html"
        },
        {
          "name": "36701",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36701"
        },
        {
          "name": "RHSA-2008:0505",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0505.html"
        },
        {
          "name": "ADV-2008-2780",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2780"
        },
        {
          "name": "29106",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29106"
        },
        {
          "name": "RHSA-2008:0510",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0510.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=32167"
        },
        {
          "name": "MDVSA-2008:150",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150"
        },
        {
          "name": "DSA-1608",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1608"
        },
        {
          "name": "36566",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36566"
        },
        {
          "name": "APPLE-SA-2008-10-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3216"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-2079",
    "datePublished": "2008-05-05T16:00:00",
    "dateReserved": "2008-05-05T00:00:00",
    "dateUpdated": "2024-08-07T08:49:57.795Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3681
Vulnerability from cvelistv5
Published
2011-01-11 19:00
Modified
2024-08-07 03:18
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing "alternate reads from two indexes on a table," which triggers an assertion failure.
References
https://bugzilla.redhat.com/show_bug.cgi?id=628680x_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/42875third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0824.htmlvendor-advisory, x_refsource_REDHAT
http://www.ubuntu.com/usn/USN-1017-1vendor-advisory, x_refsource_UBUNTU
http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txtvendor-advisory, x_refsource_TURBO
http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.htmlx_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2011:012vendor-advisory, x_refsource_MANDRIVA
https://exchange.xforce.ibmcloud.com/vulnerabilities/64685vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2011/0105vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:222vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2011-0164.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0170vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0133vdb-entry, x_refsource_VUPEN
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.htmlx_refsource_CONFIRM
http://bugs.mysql.com/bug.php?id=54007x_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2143vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2011/0345vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:155vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/42936third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.htmlvendor-advisory, x_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2010-0825.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.htmlvendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/bid/42633vdb-entry, x_refsource_BID
http://www.openwall.com/lists/oss-security/2010/09/28/10mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:18:52.993Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628680"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "42875",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42875"
          },
          {
            "name": "RHSA-2010:0824",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "TLSA-2011-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html"
          },
          {
            "name": "MDVSA-2011:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
          },
          {
            "name": "mysql-handler-interface-dos(64685)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64685"
          },
          {
            "name": "ADV-2011-0105",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0105"
          },
          {
            "name": "MDVSA-2010:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "name": "ADV-2011-0133",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0133"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=54007"
          },
          {
            "name": "DSA-2143",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2143"
          },
          {
            "name": "ADV-2011-0345",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0345"
          },
          {
            "name": "MDVSA-2010:155",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "name": "SUSE-SR:2010:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
          },
          {
            "name": "RHSA-2010:0825",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
          },
          {
            "name": "SUSE-SR:2010:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
          },
          {
            "name": "42633",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42633"
          },
          {
            "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing \"alternate reads from two indexes on a table,\" which triggers an assertion failure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628680"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "42875",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42875"
        },
        {
          "name": "RHSA-2010:0824",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "TLSA-2011-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html"
        },
        {
          "name": "MDVSA-2011:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
        },
        {
          "name": "mysql-handler-interface-dos(64685)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64685"
        },
        {
          "name": "ADV-2011-0105",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0105"
        },
        {
          "name": "MDVSA-2010:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "name": "ADV-2011-0133",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0133"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=54007"
        },
        {
          "name": "DSA-2143",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2143"
        },
        {
          "name": "ADV-2011-0345",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0345"
        },
        {
          "name": "MDVSA-2010:155",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "name": "SUSE-SR:2010:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
        },
        {
          "name": "RHSA-2010:0825",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
        },
        {
          "name": "SUSE-SR:2010:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
        },
        {
          "name": "42633",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42633"
        },
        {
          "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3681",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing \"alternate reads from two indexes on a table,\" which triggers an assertion failure."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628680",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628680"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "42875",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42875"
            },
            {
              "name": "RHSA-2010:0824",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "TLSA-2011-3",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html"
            },
            {
              "name": "MDVSA-2011:012",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
            },
            {
              "name": "mysql-handler-interface-dos(64685)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64685"
            },
            {
              "name": "ADV-2011-0105",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0105"
            },
            {
              "name": "MDVSA-2010:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "ADV-2011-0133",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0133"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=54007",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=54007"
            },
            {
              "name": "DSA-2143",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2143"
            },
            {
              "name": "ADV-2011-0345",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0345"
            },
            {
              "name": "MDVSA-2010:155",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "SUSE-SR:2010:021",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
            },
            {
              "name": "RHSA-2010:0825",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
            },
            {
              "name": "SUSE-SR:2010:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
            },
            {
              "name": "42633",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42633"
            },
            {
              "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3681",
    "datePublished": "2011-01-11T19:00:00",
    "dateReserved": "2010-09-28T00:00:00",
    "dateUpdated": "2024-08-07T03:18:52.993Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-4227
Vulnerability from cvelistv5
Published
2006-08-18 19:55
Modified
2024-08-07 18:57
Severity ?
Summary
MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine's definer instead of the routine's caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/28442vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/3306vdb-entry, x_refsource_VUPEN
http://www.novell.com/linux/security/advisories/2006_23_sr.htmlvendor-advisory, x_refsource_SUSE
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105vdb-entry, signature, x_refsource_OVAL
http://www.ubuntu.com/usn/usn-338-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/21506third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/19559vdb-entry, x_refsource_BID
http://secunia.com/advisories/22080third-party-advisory, x_refsource_SECUNIA
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.htmlx_refsource_CONFIRM
http://secunia.com/advisories/21770third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30351third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1016709vdb-entry, x_refsource_SECTRACK
http://www.redhat.com/support/errata/RHSA-2007-0083.htmlvendor-advisory, x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2008-0364.htmlvendor-advisory, x_refsource_REDHAT
http://bugs.mysql.com/bug.php?id=18630x_refsource_CONFIRM
http://lists.mysql.com/commits/7918mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:57:46.439Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mysql-grant-execute-privilege-escalation(28442)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28442"
          },
          {
            "name": "ADV-2006-3306",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3306"
          },
          {
            "name": "SUSE-SR:2006:023",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
          },
          {
            "name": "oval:org.mitre.oval:def:10105",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105"
          },
          {
            "name": "USN-338-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-338-1"
          },
          {
            "name": "21506",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21506"
          },
          {
            "name": "19559",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19559"
          },
          {
            "name": "22080",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22080"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
          },
          {
            "name": "21770",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21770"
          },
          {
            "name": "30351",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30351"
          },
          {
            "name": "1016709",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016709"
          },
          {
            "name": "RHSA-2007:0083",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
          },
          {
            "name": "RHSA-2008:0364",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=18630"
          },
          {
            "name": "[commits] 20060620 bk commit into 5.0 tree (kroki:1.2168) BUG#18630",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/commits/7918"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine\u0027s definer instead of the routine\u0027s caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "mysql-grant-execute-privilege-escalation(28442)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28442"
        },
        {
          "name": "ADV-2006-3306",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3306"
        },
        {
          "name": "SUSE-SR:2006:023",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
        },
        {
          "name": "oval:org.mitre.oval:def:10105",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105"
        },
        {
          "name": "USN-338-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-338-1"
        },
        {
          "name": "21506",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21506"
        },
        {
          "name": "19559",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19559"
        },
        {
          "name": "22080",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22080"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
        },
        {
          "name": "21770",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21770"
        },
        {
          "name": "30351",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30351"
        },
        {
          "name": "1016709",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016709"
        },
        {
          "name": "RHSA-2007:0083",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
        },
        {
          "name": "RHSA-2008:0364",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=18630"
        },
        {
          "name": "[commits] 20060620 bk commit into 5.0 tree (kroki:1.2168) BUG#18630",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.mysql.com/commits/7918"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4227",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine\u0027s definer instead of the routine\u0027s caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mysql-grant-execute-privilege-escalation(28442)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28442"
            },
            {
              "name": "ADV-2006-3306",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3306"
            },
            {
              "name": "SUSE-SR:2006:023",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
            },
            {
              "name": "oval:org.mitre.oval:def:10105",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105"
            },
            {
              "name": "USN-338-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-338-1"
            },
            {
              "name": "21506",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21506"
            },
            {
              "name": "19559",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19559"
            },
            {
              "name": "22080",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22080"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
            },
            {
              "name": "21770",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21770"
            },
            {
              "name": "30351",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30351"
            },
            {
              "name": "1016709",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016709"
            },
            {
              "name": "RHSA-2007:0083",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
            },
            {
              "name": "RHSA-2008:0364",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=18630",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=18630"
            },
            {
              "name": "[commits] 20060620 bk commit into 5.0 tree (kroki:1.2168) BUG#18630",
              "refsource": "MLIST",
              "url": "http://lists.mysql.com/commits/7918"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4227",
    "datePublished": "2006-08-18T19:55:00",
    "dateReserved": "2006-08-18T00:00:00",
    "dateUpdated": "2024-08-07T18:57:46.439Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-5026
Vulnerability from cvelistv5
Published
2012-08-17 00:00
Modified
2024-08-07 07:24
Severity ?
Summary
The executable comment feature in MySQL 5.0.x before 5.0.93 and 5.1.x before 5.1.50, when running in certain slave configurations in which the slave is running a newer version than the master, allows remote attackers to execute arbitrary SQL commands via custom comments.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:53.981Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640177"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=49124"
          },
          {
            "name": "SUSE-SU-2012:0984",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html"
          },
          {
            "name": "[oss-security] 20111018 Re: MySQL executable comment execution on MySQL slave server (from 2009)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2011/q4/101"
          },
          {
            "name": "49179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49179"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-11-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The executable comment feature in MySQL 5.0.x before 5.0.93 and 5.1.x before 5.1.50, when running in certain slave configurations in which the slave is running a newer version than the master, allows remote attackers to execute arbitrary SQL commands via custom comments."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-10-13T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640177"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=49124"
        },
        {
          "name": "SUSE-SU-2012:0984",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html"
        },
        {
          "name": "[oss-security] 20111018 Re: MySQL executable comment execution on MySQL slave server (from 2009)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2011/q4/101"
        },
        {
          "name": "49179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49179"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2009-5026",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The executable comment feature in MySQL 5.0.x before 5.0.93 and 5.1.x before 5.1.50, when running in certain slave configurations in which the slave is running a newer version than the master, allows remote attackers to execute arbitrary SQL commands via custom comments."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640177",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640177"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=49124",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=49124"
            },
            {
              "name": "SUSE-SU-2012:0984",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html"
            },
            {
              "name": "[oss-security] 20111018 Re: MySQL executable comment execution on MySQL slave server (from 2009)",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2011/q4/101"
            },
            {
              "name": "49179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49179"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-5026",
    "datePublished": "2012-08-17T00:00:00",
    "dateReserved": "2010-12-09T00:00:00",
    "dateUpdated": "2024-08-07T07:24:53.981Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3839
Vulnerability from cvelistv5
Published
2011-01-14 18:00
Modified
2024-08-07 03:26
Severity ?
Summary
MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:26:12.165Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "MDVSA-2010:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "name": "43676",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43676"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=53544"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "name": "RHSA-2010:0825",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
          },
          {
            "name": "mysql-invocations-dos(64839)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64839"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640861"
          },
          {
            "name": "MDVSA-2010:223",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "MDVSA-2010:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "name": "43676",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43676"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=53544"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "name": "RHSA-2010:0825",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
        },
        {
          "name": "mysql-invocations-dos(64839)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64839"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640861"
        },
        {
          "name": "MDVSA-2010:223",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3839",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "MDVSA-2010:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "43676",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43676"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=53544",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=53544"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "RHSA-2010:0825",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
            },
            {
              "name": "mysql-invocations-dos(64839)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64839"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640861",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640861"
            },
            {
              "name": "MDVSA-2010:223",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3839",
    "datePublished": "2011-01-14T18:00:00",
    "dateReserved": "2010-10-07T00:00:00",
    "dateUpdated": "2024-08-07T03:26:12.165Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-0903
Vulnerability from cvelistv5
Published
2006-02-27 23:00
Modified
2024-08-07 16:48
Severity ?
Summary
MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.
References
http://www.mandriva.com/security/advisories?name=MDKSA-2006:064vendor-advisory, x_refsource_MANDRIVA
http://bugs.mysql.com/bug.php?id=17667x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915vdb-entry, signature, x_refsource_OVAL
http://www.debian.org/security/2006/dsa-1079vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/19034third-party-advisory, x_refsource_SECUNIA
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.htmlmailing-list, x_refsource_FULLDISC
http://rst.void.ru/papers/advisory39.txtx_refsource_MISC
http://www.ubuntu.com/usn/usn-274-2vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/16850vdb-entry, x_refsource_BID
http://secunia.com/advisories/20241third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/274-1/vendor-advisory, x_refsource_UBUNTU
http://securitytracker.com/id?1015693vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/20333third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19502third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30351third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1071vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2007-0083.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2006/0752vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/20253third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19814third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1073vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2008-0364.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/20625third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/24966vdb-entry, x_refsource_XF
http://www.redhat.com/support/errata/RHSA-2006-0544.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:48:56.622Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDKSA-2006:064",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:064"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=17667"
          },
          {
            "name": "oval:org.mitre.oval:def:9915",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915"
          },
          {
            "name": "DSA-1079",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1079"
          },
          {
            "name": "19034",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19034"
          },
          {
            "name": "20060225 mysql \u003c= 5.0.18",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://rst.void.ru/papers/advisory39.txt"
          },
          {
            "name": "USN-274-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-274-2"
          },
          {
            "name": "16850",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16850"
          },
          {
            "name": "20241",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20241"
          },
          {
            "name": "USN-274-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/274-1/"
          },
          {
            "name": "1015693",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015693"
          },
          {
            "name": "20333",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20333"
          },
          {
            "name": "19502",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19502"
          },
          {
            "name": "30351",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30351"
          },
          {
            "name": "DSA-1071",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1071"
          },
          {
            "name": "RHSA-2007:0083",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
          },
          {
            "name": "ADV-2006-0752",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0752"
          },
          {
            "name": "20253",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20253"
          },
          {
            "name": "19814",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19814"
          },
          {
            "name": "DSA-1073",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1073"
          },
          {
            "name": "RHSA-2008:0364",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
          },
          {
            "name": "20625",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20625"
          },
          {
            "name": "mysql-query-log-bypass-security(24966)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24966"
          },
          {
            "name": "RHSA-2006:0544",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function.  NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "MDKSA-2006:064",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:064"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=17667"
        },
        {
          "name": "oval:org.mitre.oval:def:9915",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915"
        },
        {
          "name": "DSA-1079",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1079"
        },
        {
          "name": "19034",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19034"
        },
        {
          "name": "20060225 mysql \u003c= 5.0.18",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://rst.void.ru/papers/advisory39.txt"
        },
        {
          "name": "USN-274-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-274-2"
        },
        {
          "name": "16850",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16850"
        },
        {
          "name": "20241",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20241"
        },
        {
          "name": "USN-274-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/274-1/"
        },
        {
          "name": "1015693",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015693"
        },
        {
          "name": "20333",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20333"
        },
        {
          "name": "19502",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19502"
        },
        {
          "name": "30351",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30351"
        },
        {
          "name": "DSA-1071",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1071"
        },
        {
          "name": "RHSA-2007:0083",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
        },
        {
          "name": "ADV-2006-0752",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0752"
        },
        {
          "name": "20253",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20253"
        },
        {
          "name": "19814",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19814"
        },
        {
          "name": "DSA-1073",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1073"
        },
        {
          "name": "RHSA-2008:0364",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
        },
        {
          "name": "20625",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20625"
        },
        {
          "name": "mysql-query-log-bypass-security(24966)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24966"
        },
        {
          "name": "RHSA-2006:0544",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2006-0903",
    "datePublished": "2006-02-27T23:00:00",
    "dateReserved": "2006-02-27T00:00:00",
    "dateUpdated": "2024-08-07T16:48:56.622Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-7247
Vulnerability from cvelistv5
Published
2009-11-30 17:00
Modified
2024-08-07 11:56
Severity ?
Summary
sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:56:14.541Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "38517",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38517"
          },
          {
            "name": "ADV-2010-1107",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1107"
          },
          {
            "name": "USN-897-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-897-1"
          },
          {
            "name": "SUSE-SR:2010:011",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=39277"
          },
          {
            "name": "APPLE-SA-2010-03-29-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4077"
          },
          {
            "name": "[oss-security] 20091124 Re: mysql-5.1.41",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2"
          },
          {
            "name": "SUSE-SR:2010:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543619"
          },
          {
            "name": "MDVSA-2010:044",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:044"
          },
          {
            "name": "38043",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/38043"
          },
          {
            "name": "[commits] 20081124 bzr commit into mysql-6.0-backup branch (ingo.struewing:2744) Bug#39277",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/commits/59711"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-11-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "38517",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38517"
        },
        {
          "name": "ADV-2010-1107",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1107"
        },
        {
          "name": "USN-897-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-897-1"
        },
        {
          "name": "SUSE-SR:2010:011",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=39277"
        },
        {
          "name": "APPLE-SA-2010-03-29-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4077"
        },
        {
          "name": "[oss-security] 20091124 Re: mysql-5.1.41",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2"
        },
        {
          "name": "SUSE-SR:2010:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543619"
        },
        {
          "name": "MDVSA-2010:044",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:044"
        },
        {
          "name": "38043",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/38043"
        },
        {
          "name": "[commits] 20081124 bzr commit into mysql-6.0-backup branch (ingo.struewing:2744) Bug#39277",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.mysql.com/commits/59711"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-7247",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "38517",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38517"
            },
            {
              "name": "ADV-2010-1107",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/1107"
            },
            {
              "name": "USN-897-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-897-1"
            },
            {
              "name": "SUSE-SR:2010:011",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=39277",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=39277"
            },
            {
              "name": "APPLE-SA-2010-03-29-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
            },
            {
              "name": "http://support.apple.com/kb/HT4077",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4077"
            },
            {
              "name": "[oss-security] 20091124 Re: mysql-5.1.41",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2"
            },
            {
              "name": "SUSE-SR:2010:021",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=543619",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543619"
            },
            {
              "name": "MDVSA-2010:044",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:044"
            },
            {
              "name": "38043",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/38043"
            },
            {
              "name": "[commits] 20081124 bzr commit into mysql-6.0-backup branch (ingo.struewing:2744) Bug#39277",
              "refsource": "MLIST",
              "url": "http://lists.mysql.com/commits/59711"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-7247",
    "datePublished": "2009-11-30T17:00:00",
    "dateReserved": "2009-11-25T00:00:00",
    "dateUpdated": "2024-08-07T11:56:14.541Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-1636
Vulnerability from cvelistv5
Published
2005-05-17 04:00
Modified
2024-08-07 21:59
Severity ?
Summary
mysql_install_db in MySQL 4.1.x before 4.1.12 and 5.x up to 5.0.4 creates the mysql_install_db.X file with a predictable filename and insecure permissions, which allows local users to execute arbitrary SQL commands by modifying the file's contents.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:59:23.548Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zataz.net/adviso/mysql-05172005.txt"
          },
          {
            "name": "15369",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15369"
          },
          {
            "name": "17080",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17080"
          },
          {
            "name": "20050517 MySQL \u003c 4.0.12 \u0026\u0026 MySQL \u003c= 5.0.4 : Insecure tmp",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=111632686805498\u0026w=2"
          },
          {
            "name": "13660",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/13660"
          },
          {
            "name": "oval:org.mitre.oval:def:9504",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688"
          },
          {
            "name": "MDKSA-2006:045",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:045"
          },
          {
            "name": "RHSA-2005:685",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-685.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-05-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "mysql_install_db in MySQL 4.1.x before 4.1.12 and 5.x up to 5.0.4 creates the mysql_install_db.X file with a predictable filename and insecure permissions, which allows local users to execute arbitrary SQL commands by modifying the file\u0027s contents."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zataz.net/adviso/mysql-05172005.txt"
        },
        {
          "name": "15369",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15369"
        },
        {
          "name": "17080",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17080"
        },
        {
          "name": "20050517 MySQL \u003c 4.0.12 \u0026\u0026 MySQL \u003c= 5.0.4 : Insecure tmp",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=111632686805498\u0026w=2"
        },
        {
          "name": "13660",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/13660"
        },
        {
          "name": "oval:org.mitre.oval:def:9504",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688"
        },
        {
          "name": "MDKSA-2006:045",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:045"
        },
        {
          "name": "RHSA-2005:685",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-685.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1636",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mysql_install_db in MySQL 4.1.x before 4.1.12 and 5.x up to 5.0.4 creates the mysql_install_db.X file with a predictable filename and insecure permissions, which allows local users to execute arbitrary SQL commands by modifying the file\u0027s contents."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.zataz.net/adviso/mysql-05172005.txt",
              "refsource": "MISC",
              "url": "http://www.zataz.net/adviso/mysql-05172005.txt"
            },
            {
              "name": "15369",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15369"
            },
            {
              "name": "17080",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17080"
            },
            {
              "name": "20050517 MySQL \u003c 4.0.12 \u0026\u0026 MySQL \u003c= 5.0.4 : Insecure tmp",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=111632686805498\u0026w=2"
            },
            {
              "name": "13660",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/13660"
            },
            {
              "name": "oval:org.mitre.oval:def:9504",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504"
            },
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688"
            },
            {
              "name": "MDKSA-2006:045",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:045"
            },
            {
              "name": "RHSA-2005:685",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-685.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1636",
    "datePublished": "2005-05-17T04:00:00",
    "dateReserved": "2005-05-17T00:00:00",
    "dateUpdated": "2024-08-07T21:59:23.548Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3676
Vulnerability from cvelistv5
Published
2011-01-11 19:00
Modified
2024-08-07 03:18
Severity ?
Summary
storage/innobase/dict/dict0crea.c in mysqld in Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (assertion failure) by modifying the (1) innodb_file_format or (2) innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:18:52.995Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=55039"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628660"
          },
          {
            "name": "MDVSA-2011:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
          },
          {
            "name": "mysql-dictocrea-dos(64689)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64689"
          },
          {
            "name": "ADV-2011-0133",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0133"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
          },
          {
            "name": "42643",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42643"
          },
          {
            "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "storage/innobase/dict/dict0crea.c in mysqld in Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (assertion failure) by modifying the (1) innodb_file_format or (2) innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=55039"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628660"
        },
        {
          "name": "MDVSA-2011:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
        },
        {
          "name": "mysql-dictocrea-dos(64689)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64689"
        },
        {
          "name": "ADV-2011-0133",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0133"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
        },
        {
          "name": "42643",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42643"
        },
        {
          "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3676",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "storage/innobase/dict/dict0crea.c in mysqld in Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (assertion failure) by modifying the (1) innodb_file_format or (2) innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.mysql.com/bug.php?id=55039",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=55039"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628660",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628660"
            },
            {
              "name": "MDVSA-2011:012",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
            },
            {
              "name": "mysql-dictocrea-dos(64689)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64689"
            },
            {
              "name": "ADV-2011-0133",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0133"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
            },
            {
              "name": "42643",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42643"
            },
            {
              "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3676",
    "datePublished": "2011-01-11T19:00:00",
    "dateReserved": "2010-09-28T00:00:00",
    "dateUpdated": "2024-08-07T03:18:52.995Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-0837
Vulnerability from cvelistv5
Published
2004-10-16 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.
References
http://lists.mysql.com/internals/16174x_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2004-611.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/12783/third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2004/dsa-562vendor-advisory, x_refsource_DEBIAN
http://marc.info/?l=bugtraq&m=110140517515735&w=2mailing-list, x_refsource_BUGTRAQ
http://lists.mysql.com/internals/16173x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/17667vdb-entry, x_refsource_XF
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1vendor-advisory, x_refsource_SUNALERT
http://www.securityfocus.com/bid/11357vdb-entry, x_refsource_BID
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892vendor-advisory, x_refsource_CONECTIVA
http://www.redhat.com/support/errata/RHSA-2004-597.htmlvendor-advisory, x_refsource_REDHAT
http://www.ciac.org/ciac/bulletins/p-018.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
http://lists.mysql.com/internals/16168x_refsource_MISC
http://www.gentoo.org/security/en/glsa/glsa-200410-22.xmlvendor-advisory, x_refsource_GENTOO
http://www.trustix.org/errata/2004/0054/vendor-advisory, x_refsource_TRUSTIX
http://bugs.mysql.com/2408x_refsource_MISC
http://securitytracker.com/id?1011606vdb-entry, x_refsource_SECTRACK
http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15x_refsource_MISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:31:47.457Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/internals/16174"
          },
          {
            "name": "RHSA-2004:611",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html"
          },
          {
            "name": "12783",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/12783/"
          },
          {
            "name": "DSA-562",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2004/dsa-562"
          },
          {
            "name": "20041125 [USN-32-1] mysql vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/internals/16173"
          },
          {
            "name": "mysql-union-dos(17667)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667"
          },
          {
            "name": "101864",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
          },
          {
            "name": "11357",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11357"
          },
          {
            "name": "CLA-2004:892",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892"
          },
          {
            "name": "RHSA-2004:597",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
          },
          {
            "name": "P-018",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/internals/16168"
          },
          {
            "name": "GLSA-200410-22",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml"
          },
          {
            "name": "2004-0054",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2004/0054/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/2408"
          },
          {
            "name": "1011606",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1011606"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-10-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.mysql.com/internals/16174"
        },
        {
          "name": "RHSA-2004:611",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html"
        },
        {
          "name": "12783",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/12783/"
        },
        {
          "name": "DSA-562",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2004/dsa-562"
        },
        {
          "name": "20041125 [USN-32-1] mysql vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.mysql.com/internals/16173"
        },
        {
          "name": "mysql-union-dos(17667)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667"
        },
        {
          "name": "101864",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
        },
        {
          "name": "11357",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11357"
        },
        {
          "name": "CLA-2004:892",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892"
        },
        {
          "name": "RHSA-2004:597",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
        },
        {
          "name": "P-018",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.mysql.com/internals/16168"
        },
        {
          "name": "GLSA-200410-22",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml"
        },
        {
          "name": "2004-0054",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2004/0054/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/2408"
        },
        {
          "name": "1011606",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1011606"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0837",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://lists.mysql.com/internals/16174",
              "refsource": "MISC",
              "url": "http://lists.mysql.com/internals/16174"
            },
            {
              "name": "RHSA-2004:611",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html"
            },
            {
              "name": "12783",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/12783/"
            },
            {
              "name": "DSA-562",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2004/dsa-562"
            },
            {
              "name": "20041125 [USN-32-1] mysql vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2"
            },
            {
              "name": "http://lists.mysql.com/internals/16173",
              "refsource": "MISC",
              "url": "http://lists.mysql.com/internals/16173"
            },
            {
              "name": "mysql-union-dos(17667)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667"
            },
            {
              "name": "101864",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
            },
            {
              "name": "11357",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11357"
            },
            {
              "name": "CLA-2004:892",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892"
            },
            {
              "name": "RHSA-2004:597",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
            },
            {
              "name": "P-018",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
            },
            {
              "name": "http://lists.mysql.com/internals/16168",
              "refsource": "MISC",
              "url": "http://lists.mysql.com/internals/16168"
            },
            {
              "name": "GLSA-200410-22",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml"
            },
            {
              "name": "2004-0054",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2004/0054/"
            },
            {
              "name": "http://bugs.mysql.com/2408",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/2408"
            },
            {
              "name": "1011606",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1011606"
            },
            {
              "name": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15",
              "refsource": "MISC",
              "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0837",
    "datePublished": "2004-10-16T04:00:00",
    "dateReserved": "2004-09-08T00:00:00",
    "dateUpdated": "2024-08-08T00:31:47.457Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-2558
Vulnerability from cvelistv5
Published
2005-08-16 04:00
Modified
2024-08-07 22:30
Severity ?
Summary
Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field.
References
http://www.debian.org/security/2005/dsa-831vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/21737vdb-entry, x_refsource_XF
http://www.mandriva.com/security/advisories?name=MDKSA-2005:163vendor-advisory, x_refsource_MANDRIVA
http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.htmlmailing-list, x_refsource_FULLDISC
https://www.ubuntu.com/usn/usn-180-2/vendor-advisory, x_refsource_UBUNTU
https://www.ubuntu.com/usn/usn-180-1/vendor-advisory, x_refsource_UBUNTU
http://www.novell.com/linux/security/advisories/2005_21_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2005/dsa-833vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2005/dsa-829vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/20381third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/14509vdb-entry, x_refsource_BID
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1vendor-advisory, x_refsource_SUNALERT
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.htmlvendor-advisory, x_refsource_FEDORA
http://www.appsecinc.com/resources/alerts/mysql/2005-002.htmlx_refsource_MISC
http://marc.info/?l=bugtraq&m=112354450412427&w=2mailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/1326/referencesvdb-entry, x_refsource_VUPEN
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txtvendor-advisory, x_refsource_SCO
http://secunia.com/advisories/17027third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29847third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:30:01.178Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-831",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-831"
          },
          {
            "name": "mysql-user-defined-function-bo(21737)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21737"
          },
          {
            "name": "MDKSA-2005:163",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:163"
          },
          {
            "name": "20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html"
          },
          {
            "name": "USN-180-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://www.ubuntu.com/usn/usn-180-2/"
          },
          {
            "name": "USN-180-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://www.ubuntu.com/usn/usn-180-1/"
          },
          {
            "name": "SUSE-SR:2005:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_21_sr.html"
          },
          {
            "name": "DSA-833",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-833"
          },
          {
            "name": "DSA-829",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-829"
          },
          {
            "name": "20381",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20381"
          },
          {
            "name": "14509",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14509"
          },
          {
            "name": "236703",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
          },
          {
            "name": "FLSA-2006:167803",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-002.html"
          },
          {
            "name": "20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112354450412427\u0026w=2"
          },
          {
            "name": "ADV-2008-1326",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1326/references"
          },
          {
            "name": "SCOSA-2006.18",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt"
          },
          {
            "name": "17027",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17027"
          },
          {
            "name": "29847",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29847"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-05-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-831",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-831"
        },
        {
          "name": "mysql-user-defined-function-bo(21737)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21737"
        },
        {
          "name": "MDKSA-2005:163",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:163"
        },
        {
          "name": "20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html"
        },
        {
          "name": "USN-180-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://www.ubuntu.com/usn/usn-180-2/"
        },
        {
          "name": "USN-180-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://www.ubuntu.com/usn/usn-180-1/"
        },
        {
          "name": "SUSE-SR:2005:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_21_sr.html"
        },
        {
          "name": "DSA-833",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-833"
        },
        {
          "name": "DSA-829",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-829"
        },
        {
          "name": "20381",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20381"
        },
        {
          "name": "14509",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14509"
        },
        {
          "name": "236703",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
        },
        {
          "name": "FLSA-2006:167803",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-002.html"
        },
        {
          "name": "20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112354450412427\u0026w=2"
        },
        {
          "name": "ADV-2008-1326",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1326/references"
        },
        {
          "name": "SCOSA-2006.18",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt"
        },
        {
          "name": "17027",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17027"
        },
        {
          "name": "29847",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29847"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2558",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-831",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-831"
            },
            {
              "name": "mysql-user-defined-function-bo(21737)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21737"
            },
            {
              "name": "MDKSA-2005:163",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:163"
            },
            {
              "name": "20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html"
            },
            {
              "name": "USN-180-2",
              "refsource": "UBUNTU",
              "url": "https://www.ubuntu.com/usn/usn-180-2/"
            },
            {
              "name": "USN-180-1",
              "refsource": "UBUNTU",
              "url": "https://www.ubuntu.com/usn/usn-180-1/"
            },
            {
              "name": "SUSE-SR:2005:021",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_21_sr.html"
            },
            {
              "name": "DSA-833",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-833"
            },
            {
              "name": "DSA-829",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-829"
            },
            {
              "name": "20381",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20381"
            },
            {
              "name": "14509",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14509"
            },
            {
              "name": "236703",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
            },
            {
              "name": "FLSA-2006:167803",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html"
            },
            {
              "name": "http://www.appsecinc.com/resources/alerts/mysql/2005-002.html",
              "refsource": "MISC",
              "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-002.html"
            },
            {
              "name": "20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112354450412427\u0026w=2"
            },
            {
              "name": "ADV-2008-1326",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1326/references"
            },
            {
              "name": "SCOSA-2006.18",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt"
            },
            {
              "name": "17027",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17027"
            },
            {
              "name": "29847",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29847"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2558",
    "datePublished": "2005-08-16T04:00:00",
    "dateReserved": "2005-08-16T00:00:00",
    "dateUpdated": "2024-08-07T22:30:01.178Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3682
Vulnerability from cvelistv5
Published
2011-01-11 19:00
Modified
2024-08-07 03:18
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted "SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://support.apple.com/kb/HT4723x_refsource_CONFIRM
http://secunia.com/advisories/42875third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1017-1vendor-advisory, x_refsource_UBUNTU
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txtvendor-advisory, x_refsource_TURBO
http://www.mandriva.com/security/advisories?name=MDVSA-2011:012vendor-advisory, x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2011/0105vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:222vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2011-0164.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0170vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0133vdb-entry, x_refsource_VUPEN
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.htmlx_refsource_CONFIRM
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.htmlx_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2143vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/64684vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2011/0345vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/42599vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDVSA-2010:155vendor-advisory, x_refsource_MANDRIVA
http://bugs.mysql.com/bug.php?id=52711x_refsource_CONFIRM
http://secunia.com/advisories/42936third-party-advisory, x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=628328x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2010-0825.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.htmlvendor-advisory, x_refsource_SUSE
http://www.openwall.com/lists/oss-security/2010/09/28/10mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:18:52.644Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4723"
          },
          {
            "name": "42875",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42875"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "APPLE-SA-2011-06-23-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
          },
          {
            "name": "TLSA-2011-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
          },
          {
            "name": "MDVSA-2011:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
          },
          {
            "name": "ADV-2011-0105",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0105"
          },
          {
            "name": "MDVSA-2010:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "name": "ADV-2011-0133",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0133"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
          },
          {
            "name": "DSA-2143",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2143"
          },
          {
            "name": "mysql-itemsinglerowsubselect-dos(64684)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684"
          },
          {
            "name": "ADV-2011-0345",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0345"
          },
          {
            "name": "42599",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42599"
          },
          {
            "name": "MDVSA-2010:155",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=52711"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628328"
          },
          {
            "name": "RHSA-2010:0825",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
          },
          {
            "name": "SUSE-SR:2010:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
          },
          {
            "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4723"
        },
        {
          "name": "42875",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42875"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "APPLE-SA-2011-06-23-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
        },
        {
          "name": "TLSA-2011-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
        },
        {
          "name": "MDVSA-2011:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
        },
        {
          "name": "ADV-2011-0105",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0105"
        },
        {
          "name": "MDVSA-2010:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "name": "ADV-2011-0133",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0133"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
        },
        {
          "name": "DSA-2143",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2143"
        },
        {
          "name": "mysql-itemsinglerowsubselect-dos(64684)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684"
        },
        {
          "name": "ADV-2011-0345",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0345"
        },
        {
          "name": "42599",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42599"
        },
        {
          "name": "MDVSA-2010:155",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=52711"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628328"
        },
        {
          "name": "RHSA-2010:0825",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
        },
        {
          "name": "SUSE-SR:2010:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
        },
        {
          "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3682",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "http://support.apple.com/kb/HT4723",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4723"
            },
            {
              "name": "42875",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42875"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "APPLE-SA-2011-06-23-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
            },
            {
              "name": "TLSA-2011-3",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
            },
            {
              "name": "MDVSA-2011:012",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
            },
            {
              "name": "ADV-2011-0105",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0105"
            },
            {
              "name": "MDVSA-2010:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "ADV-2011-0133",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0133"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
            },
            {
              "name": "DSA-2143",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2143"
            },
            {
              "name": "mysql-itemsinglerowsubselect-dos(64684)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684"
            },
            {
              "name": "ADV-2011-0345",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0345"
            },
            {
              "name": "42599",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42599"
            },
            {
              "name": "MDVSA-2010:155",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=52711",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=52711"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628328",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628328"
            },
            {
              "name": "RHSA-2010:0825",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
            },
            {
              "name": "SUSE-SR:2010:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
            },
            {
              "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3682",
    "datePublished": "2011-01-11T19:00:00",
    "dateReserved": "2010-09-28T00:00:00",
    "dateUpdated": "2024-08-07T03:18:52.644Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-2691
Vulnerability from cvelistv5
Published
2007-05-16 01:00
Modified
2024-08-07 13:49
Severity ?
Summary
MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.
References
http://bugs.mysql.com/bug.php?id=27515x_refsource_MISC
http://secunia.com/advisories/27823third-party-advisory, x_refsource_SECUNIA
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.htmlx_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2007-0894.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/26073third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/31681vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1018069vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/31226third-party-advisory, x_refsource_SECUNIA
http://lists.mysql.com/announce/470mailing-list, x_refsource_MLIST
http://www.vupen.com/english/advisories/2007/1804vdb-entry, x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2008-0768.htmlvendor-advisory, x_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilities/34347vdb-entry, x_refsource_XF
http://secunia.com/advisories/25946third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/473874/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/24016vdb-entry, x_refsource_BID
http://secunia.com/advisories/25301third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2007/dsa-1413vendor-advisory, x_refsource_DEBIAN
http://osvdb.org/34766vdb-entry, x_refsource_OSVDB
https://issues.rpath.com/browse/RPL-1536x_refsource_CONFIRM
http://secunia.com/advisories/32222third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/528-1/vendor-advisory, x_refsource_UBUNTU
http://www.mandriva.com/security/advisories?name=MDKSA-2007:139vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/30351third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27155third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26430third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2780vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/28838third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.htmlvendor-advisory, x_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2008-0364.htmlvendor-advisory, x_refsource_REDHAT
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlvendor-advisory, x_refsource_APPLE
http://support.apple.com/kb/HT3216x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559vdb-entry, signature, x_refsource_OVAL
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:49:57.228Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=27515"
          },
          {
            "name": "27823",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27823"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
          },
          {
            "name": "RHSA-2007:0894",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html"
          },
          {
            "name": "26073",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26073"
          },
          {
            "name": "31681",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31681"
          },
          {
            "name": "1018069",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018069"
          },
          {
            "name": "31226",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31226"
          },
          {
            "name": "[announce] 20070712 MySQL Community Server 5.0.45 has been released!",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/announce/470"
          },
          {
            "name": "ADV-2007-1804",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1804"
          },
          {
            "name": "RHSA-2008:0768",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
          },
          {
            "name": "mysql-renametable-weak-security(34347)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34347"
          },
          {
            "name": "25946",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25946"
          },
          {
            "name": "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
          },
          {
            "name": "24016",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24016"
          },
          {
            "name": "25301",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25301"
          },
          {
            "name": "DSA-1413",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1413"
          },
          {
            "name": "34766",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/34766"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1536"
          },
          {
            "name": "32222",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32222"
          },
          {
            "name": "USN-528-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/528-1/"
          },
          {
            "name": "MDKSA-2007:139",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139"
          },
          {
            "name": "30351",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30351"
          },
          {
            "name": "27155",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27155"
          },
          {
            "name": "26430",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26430"
          },
          {
            "name": "ADV-2008-2780",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2780"
          },
          {
            "name": "28838",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28838"
          },
          {
            "name": "SUSE-SR:2008:003",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
          },
          {
            "name": "RHSA-2008:0364",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
          },
          {
            "name": "APPLE-SA-2008-10-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3216"
          },
          {
            "name": "oval:org.mitre.oval:def:9559",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-05-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=27515"
        },
        {
          "name": "27823",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27823"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
        },
        {
          "name": "RHSA-2007:0894",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html"
        },
        {
          "name": "26073",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26073"
        },
        {
          "name": "31681",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31681"
        },
        {
          "name": "1018069",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018069"
        },
        {
          "name": "31226",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31226"
        },
        {
          "name": "[announce] 20070712 MySQL Community Server 5.0.45 has been released!",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.mysql.com/announce/470"
        },
        {
          "name": "ADV-2007-1804",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1804"
        },
        {
          "name": "RHSA-2008:0768",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
        },
        {
          "name": "mysql-renametable-weak-security(34347)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34347"
        },
        {
          "name": "25946",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25946"
        },
        {
          "name": "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
        },
        {
          "name": "24016",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24016"
        },
        {
          "name": "25301",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25301"
        },
        {
          "name": "DSA-1413",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1413"
        },
        {
          "name": "34766",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/34766"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1536"
        },
        {
          "name": "32222",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32222"
        },
        {
          "name": "USN-528-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/528-1/"
        },
        {
          "name": "MDKSA-2007:139",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139"
        },
        {
          "name": "30351",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30351"
        },
        {
          "name": "27155",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27155"
        },
        {
          "name": "26430",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26430"
        },
        {
          "name": "ADV-2008-2780",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2780"
        },
        {
          "name": "28838",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28838"
        },
        {
          "name": "SUSE-SR:2008:003",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
        },
        {
          "name": "RHSA-2008:0364",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
        },
        {
          "name": "APPLE-SA-2008-10-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3216"
        },
        {
          "name": "oval:org.mitre.oval:def:9559",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2691",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.mysql.com/bug.php?id=27515",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=27515"
            },
            {
              "name": "27823",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27823"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
            },
            {
              "name": "RHSA-2007:0894",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html"
            },
            {
              "name": "26073",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26073"
            },
            {
              "name": "31681",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31681"
            },
            {
              "name": "1018069",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018069"
            },
            {
              "name": "31226",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31226"
            },
            {
              "name": "[announce] 20070712 MySQL Community Server 5.0.45 has been released!",
              "refsource": "MLIST",
              "url": "http://lists.mysql.com/announce/470"
            },
            {
              "name": "ADV-2007-1804",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1804"
            },
            {
              "name": "RHSA-2008:0768",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
            },
            {
              "name": "mysql-renametable-weak-security(34347)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34347"
            },
            {
              "name": "25946",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25946"
            },
            {
              "name": "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
            },
            {
              "name": "24016",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24016"
            },
            {
              "name": "25301",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25301"
            },
            {
              "name": "DSA-1413",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1413"
            },
            {
              "name": "34766",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/34766"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1536",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1536"
            },
            {
              "name": "32222",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32222"
            },
            {
              "name": "USN-528-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/528-1/"
            },
            {
              "name": "MDKSA-2007:139",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139"
            },
            {
              "name": "30351",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30351"
            },
            {
              "name": "27155",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27155"
            },
            {
              "name": "26430",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26430"
            },
            {
              "name": "ADV-2008-2780",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2780"
            },
            {
              "name": "28838",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28838"
            },
            {
              "name": "SUSE-SR:2008:003",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
            },
            {
              "name": "RHSA-2008:0364",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
            },
            {
              "name": "APPLE-SA-2008-10-09",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
            },
            {
              "name": "http://support.apple.com/kb/HT3216",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3216"
            },
            {
              "name": "oval:org.mitre.oval:def:9559",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2691",
    "datePublished": "2007-05-16T01:00:00",
    "dateReserved": "2007-05-15T00:00:00",
    "dateUpdated": "2024-08-07T13:49:57.228Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0485
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:23
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0492.
References
http://osvdb.org/78383vdb-entry, x_refsource_OSVDB
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/51513vdb-entry, x_refsource_BID
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/72526vdb-entry, x_refsource_XF
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:30.993Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "78383",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/78383"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "51513",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51513"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "name": "mysql-serveruns4-dos(72526)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72526"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0492."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "78383",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/78383"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "51513",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51513"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "name": "mysql-serveruns4-dos(72526)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72526"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0485",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0492."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "78383",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/78383"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "51513",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51513"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "mysql-serveruns4-dos(72526)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72526"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0485",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2012-01-11T00:00:00",
    "dateUpdated": "2024-08-06T18:23:30.993Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0484
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:23
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/51515vdb-entry, x_refsource_BID
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/78372vdb-entry, x_refsource_OSVDB
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.htmlvendor-advisory, x_refsource_SUSE
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/72525vdb-entry, x_refsource_XF
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:31.049Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "51515",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51515"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "name": "78372",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/78372"
          },
          {
            "name": "SUSE-SU-2012:0984",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "mysql-server-info-disc(72525)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72525"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "51515",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51515"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "name": "78372",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/78372"
        },
        {
          "name": "SUSE-SU-2012:0984",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "mysql-server-info-disc(72525)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72525"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0484",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "51515",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51515"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "78372",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/78372"
            },
            {
              "name": "SUSE-SU-2012:0984",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "mysql-server-info-disc(72525)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72525"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0484",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2012-01-11T00:00:00",
    "dateUpdated": "2024-08-06T18:23:31.049Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3833
Vulnerability from cvelistv5
Published
2011-01-14 18:00
Modified
2024-08-07 03:26
Severity ?
Summary
MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a "CREATE TABLE ... SELECT."
References
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.htmlx_refsource_CONFIRM
http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.htmlx_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
https://bugzilla.redhat.com/show_bug.cgi?id=640751x_refsource_CONFIRM
http://support.apple.com/kb/HT4723x_refsource_CONFIRM
http://secunia.com/advisories/42875third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1017-1vendor-advisory, x_refsource_UBUNTU
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txtvendor-advisory, x_refsource_TURBO
http://www.vupen.com/english/advisories/2011/0105vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:222vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2011-0164.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0170vdb-entry, x_refsource_VUPEN
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.htmlx_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2143vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/43676vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/64845vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2011/0345vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/42936third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0825.htmlvendor-advisory, x_refsource_REDHAT
http://bugs.mysql.com/bug.php?id=55826x_refsource_MISC
http://www.mandriva.com/security/advisories?name=MDVSA-2010:223vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:26:12.217Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640751"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4723"
          },
          {
            "name": "42875",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42875"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "APPLE-SA-2011-06-23-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
          },
          {
            "name": "TLSA-2011-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
          },
          {
            "name": "ADV-2011-0105",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0105"
          },
          {
            "name": "MDVSA-2010:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
          },
          {
            "name": "DSA-2143",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2143"
          },
          {
            "name": "43676",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43676"
          },
          {
            "name": "mysql-extremevalue-dos(64845)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64845"
          },
          {
            "name": "ADV-2011-0345",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0345"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "name": "RHSA-2010:0825",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=55826"
          },
          {
            "name": "MDVSA-2010:223",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a \"CREATE TABLE ... SELECT.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640751"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4723"
        },
        {
          "name": "42875",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42875"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "APPLE-SA-2011-06-23-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
        },
        {
          "name": "TLSA-2011-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
        },
        {
          "name": "ADV-2011-0105",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0105"
        },
        {
          "name": "MDVSA-2010:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
        },
        {
          "name": "DSA-2143",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2143"
        },
        {
          "name": "43676",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43676"
        },
        {
          "name": "mysql-extremevalue-dos(64845)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64845"
        },
        {
          "name": "ADV-2011-0345",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0345"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "name": "RHSA-2010:0825",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=55826"
        },
        {
          "name": "MDVSA-2010:223",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3833",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a \"CREATE TABLE ... SELECT.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640751",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640751"
            },
            {
              "name": "http://support.apple.com/kb/HT4723",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4723"
            },
            {
              "name": "42875",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42875"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "APPLE-SA-2011-06-23-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
            },
            {
              "name": "TLSA-2011-3",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
            },
            {
              "name": "ADV-2011-0105",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0105"
            },
            {
              "name": "MDVSA-2010:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
            },
            {
              "name": "DSA-2143",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2143"
            },
            {
              "name": "43676",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43676"
            },
            {
              "name": "mysql-extremevalue-dos(64845)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64845"
            },
            {
              "name": "ADV-2011-0345",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0345"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "RHSA-2010:0825",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=55826",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=55826"
            },
            {
              "name": "MDVSA-2010:223",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3833",
    "datePublished": "2011-01-14T18:00:00",
    "dateReserved": "2010-10-07T00:00:00",
    "dateUpdated": "2024-08-07T03:26:12.217Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0492
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:23
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0485.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/72537vdb-entry, x_refsource_XF
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://osvdb.org/78393vdb-entry, x_refsource_OSVDB
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.securityfocus.com/bid/51516vdb-entry, x_refsource_BID
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:30.984Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "name": "mysql-serveruns14-dos(72537)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72537"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "name": "78393",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/78393"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "51516",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51516"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0485."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "name": "mysql-serveruns14-dos(72537)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72537"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "name": "78393",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/78393"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "51516",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51516"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0492",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0485."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "mysql-serveruns14-dos(72537)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72537"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "78393",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/78393"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "51516",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51516"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0492",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2012-01-11T00:00:00",
    "dateUpdated": "2024-08-06T18:23:30.984Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-2573
Vulnerability from cvelistv5
Published
2005-08-16 04:00
Modified
2024-08-07 22:30
Severity ?
Summary
The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\) character.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:30:01.636Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mysql-udf-directory-traversal(21738)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21738"
          },
          {
            "name": "20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112360618320729\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA"
          },
          {
            "name": "20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\\) character."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "mysql-udf-directory-traversal(21738)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21738"
        },
        {
          "name": "20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112360618320729\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA"
        },
        {
          "name": "20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2573",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\\) character."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mysql-udf-directory-traversal(21738)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21738"
            },
            {
              "name": "20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112360618320729\u0026w=2"
            },
            {
              "name": "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html",
              "refsource": "MISC",
              "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html"
            },
            {
              "name": "http://mysql.bkbits.net:8080/mysql-4.0/cset@428b981bg2iwh3CbGANDaF-W6DbttA",
              "refsource": "CONFIRM",
              "url": "http://mysql.bkbits.net:8080/mysql-4.0/cset@428b981bg2iwh3CbGANDaF-W6DbttA"
            },
            {
              "name": "20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html"
            },
            {
              "name": "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch@428b981bg2iwh3CbGANDaF-W6DbttA",
              "refsource": "CONFIRM",
              "url": "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch@428b981bg2iwh3CbGANDaF-W6DbttA"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2573",
    "datePublished": "2005-08-16T04:00:00",
    "dateReserved": "2005-08-16T00:00:00",
    "dateUpdated": "2024-08-07T22:30:01.636Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-1696
Vulnerability from cvelistv5
Published
2012-05-03 22:00
Modified
2024-08-06 19:08
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
References
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/bid/53071vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1026934vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/48890third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.htmlx_refsource_CONFIRM
http://secunia.com/advisories/49179third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.184Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "53071",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53071"
          },
          {
            "name": "1026934",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026934"
          },
          {
            "name": "48890",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48890"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
          },
          {
            "name": "49179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49179"
          },
          {
            "name": "MDVSA-2013:150",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-06T21:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "53071",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53071"
        },
        {
          "name": "1026934",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026934"
        },
        {
          "name": "48890",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48890"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
        },
        {
          "name": "49179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49179"
        },
        {
          "name": "MDVSA-2013:150",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-1696",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "53071",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53071"
            },
            {
              "name": "1026934",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026934"
            },
            {
              "name": "48890",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48890"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
            },
            {
              "name": "49179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49179"
            },
            {
              "name": "MDVSA-2013:150",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-1696",
    "datePublished": "2012-05-03T22:00:00",
    "dateReserved": "2012-03-16T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0087
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:16
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/51509vdb-entry, x_refsource_BID
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.htmlvendor-advisory, x_refsource_SUSE
https://exchange.xforce.ibmcloud.com/vulnerabilities/72519vdb-entry, x_refsource_XF
http://osvdb.org/78377vdb-entry, x_refsource_OSVDB
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.564Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "51509",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51509"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "name": "SUSE-SU-2012:0984",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
          },
          {
            "name": "mysql-serveruns-dos(72519)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72519"
          },
          {
            "name": "78377",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/78377"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "51509",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51509"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "name": "SUSE-SU-2012:0984",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
        },
        {
          "name": "mysql-serveruns-dos(72519)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72519"
        },
        {
          "name": "78377",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/78377"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0087",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "51509",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51509"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "SUSE-SU-2012:0984",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
            },
            {
              "name": "mysql-serveruns-dos(72519)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72519"
            },
            {
              "name": "78377",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/78377"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0087",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-12-12T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.564Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-4030
Vulnerability from cvelistv5
Published
2009-11-30 17:00
Modified
2024-08-07 06:45
Severity ?
Summary
MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.
References
http://secunia.com/advisories/38573third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/38517third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0109.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2010/1107vdb-entry, x_refsource_VUPEN
http://www.openwall.com/lists/oss-security/2009/11/24/6mailing-list, x_refsource_MLIST
http://ubuntu.com/usn/usn-897-1vendor-advisory, x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.htmlvendor-advisory, x_refsource_SUSE
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlvendor-advisory, x_refsource_APPLE
http://www.openwall.com/lists/oss-security/2009/11/19/3mailing-list, x_refsource_MLIST
http://marc.info/?l=oss-security&m=125908080222685&w=2mailing-list, x_refsource_MLIST
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.htmlx_refsource_CONFIRM
http://support.apple.com/kb/HT4077x_refsource_CONFIRM
http://marc.info/?l=oss-security&m=125908040022018&w=2mailing-list, x_refsource_MLIST
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11116vdb-entry, signature, x_refsource_OVAL
http://www.redhat.com/support/errata/RHSA-2010-0110.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.htmlvendor-advisory, x_refsource_SUSE
http://bugs.mysql.com/bug.php?id=32167x_refsource_CONFIRM
http://lists.mysql.com/commits/89940mailing-list, x_refsource_MLIST
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8156vdb-entry, signature, x_refsource_OVAL
http://www.debian.org/security/2010/dsa-1997vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:45:51.096Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "38573",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38573"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "38517",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38517"
          },
          {
            "name": "RHSA-2010:0109",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html"
          },
          {
            "name": "ADV-2010-1107",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1107"
          },
          {
            "name": "[oss-security] 20091124 Re: mysql-5.1.41",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/11/24/6"
          },
          {
            "name": "USN-897-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-897-1"
          },
          {
            "name": "SUSE-SR:2010:011",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
          },
          {
            "name": "APPLE-SA-2010-03-29-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
          },
          {
            "name": "[oss-security] 20091119 mysql-5.1.41",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3"
          },
          {
            "name": "[oss-security] 20091124 Re: mysql-5.1.41",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=125908080222685\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4077"
          },
          {
            "name": "[oss-security] 20091124 Re: mysql-5.1.41",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2"
          },
          {
            "name": "oval:org.mitre.oval:def:11116",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11116"
          },
          {
            "name": "RHSA-2010:0110",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
          },
          {
            "name": "SUSE-SR:2010:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=32167"
          },
          {
            "name": "[commits] 20091110 bzr commit into mysql-5.0-bugteam branch (joro:2845) Bug#32167",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/commits/89940"
          },
          {
            "name": "oval:org.mitre.oval:def:8156",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8156"
          },
          {
            "name": "DSA-1997",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2010/dsa-1997"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-11-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "38573",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38573"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "38517",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38517"
        },
        {
          "name": "RHSA-2010:0109",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html"
        },
        {
          "name": "ADV-2010-1107",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1107"
        },
        {
          "name": "[oss-security] 20091124 Re: mysql-5.1.41",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/11/24/6"
        },
        {
          "name": "USN-897-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-897-1"
        },
        {
          "name": "SUSE-SR:2010:011",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
        },
        {
          "name": "APPLE-SA-2010-03-29-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
        },
        {
          "name": "[oss-security] 20091119 mysql-5.1.41",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3"
        },
        {
          "name": "[oss-security] 20091124 Re: mysql-5.1.41",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=125908080222685\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4077"
        },
        {
          "name": "[oss-security] 20091124 Re: mysql-5.1.41",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2"
        },
        {
          "name": "oval:org.mitre.oval:def:11116",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11116"
        },
        {
          "name": "RHSA-2010:0110",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
        },
        {
          "name": "SUSE-SR:2010:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=32167"
        },
        {
          "name": "[commits] 20091110 bzr commit into mysql-5.0-bugteam branch (joro:2845) Bug#32167",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.mysql.com/commits/89940"
        },
        {
          "name": "oval:org.mitre.oval:def:8156",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8156"
        },
        {
          "name": "DSA-1997",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2010/dsa-1997"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-4030",
    "datePublished": "2009-11-30T17:00:00",
    "dateReserved": "2009-11-20T00:00:00",
    "dateUpdated": "2024-08-07T06:45:51.096Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-3963
Vulnerability from cvelistv5
Published
2008-09-10 15:00
Modified
2024-08-07 10:00
Severity ?
Summary
MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b'' (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement.
References
http://bugs.mysql.com/bug.php?id=35658x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2009:094vendor-advisory, x_refsource_MANDRIVA
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.htmlx_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://www.redhat.com/support/errata/RHSA-2009-1067.htmlvendor-advisory, x_refsource_REDHAT
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.htmlx_refsource_CONFIRM
http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.htmlx_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2008/09/09/7mailing-list, x_refsource_MLIST
http://www.vupen.com/english/advisories/2008/2554vdb-entry, x_refsource_VUPEN
http://www.ubuntu.com/usn/USN-671-1vendor-advisory, x_refsource_UBUNTU
https://bugs.gentoo.org/237166x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/45042vdb-entry, x_refsource_XF
http://www.debian.org/security/2009/dsa-1783vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2009-1289.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/32769third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/32759third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/34907third-party-advisory, x_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2008/09/09/4mailing-list, x_refsource_MLIST
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/36566third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31769third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1020858vdb-entry, x_refsource_SECTRACK
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521vdb-entry, signature, x_refsource_OVAL
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:00:41.996Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=35658"
          },
          {
            "name": "MDVSA-2009:094",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "RHSA-2009:1067",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html"
          },
          {
            "name": "[oss-security] 20080909 Re: CVE request: MySQL empty bit-string literal server crash",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/09/09/7"
          },
          {
            "name": "ADV-2008-2554",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2554"
          },
          {
            "name": "USN-671-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-671-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.gentoo.org/237166"
          },
          {
            "name": "mysql-bitstring-dos(45042)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042"
          },
          {
            "name": "DSA-1783",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1783"
          },
          {
            "name": "RHSA-2009:1289",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
          },
          {
            "name": "32769",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32769"
          },
          {
            "name": "32759",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32759"
          },
          {
            "name": "34907",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34907"
          },
          {
            "name": "[oss-security] 20080909 CVE request: MySQL empty bit-string literal server crash",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/09/09/4"
          },
          {
            "name": "SUSE-SR:2008:025",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
          },
          {
            "name": "36566",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36566"
          },
          {
            "name": "31769",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31769"
          },
          {
            "name": "1020858",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020858"
          },
          {
            "name": "oval:org.mitre.oval:def:10521",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b\u0027\u0027 (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=35658"
        },
        {
          "name": "MDVSA-2009:094",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "RHSA-2009:1067",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html"
        },
        {
          "name": "[oss-security] 20080909 Re: CVE request: MySQL empty bit-string literal server crash",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/09/09/7"
        },
        {
          "name": "ADV-2008-2554",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2554"
        },
        {
          "name": "USN-671-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-671-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.gentoo.org/237166"
        },
        {
          "name": "mysql-bitstring-dos(45042)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042"
        },
        {
          "name": "DSA-1783",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1783"
        },
        {
          "name": "RHSA-2009:1289",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
        },
        {
          "name": "32769",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32769"
        },
        {
          "name": "32759",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32759"
        },
        {
          "name": "34907",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34907"
        },
        {
          "name": "[oss-security] 20080909 CVE request: MySQL empty bit-string literal server crash",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/09/09/4"
        },
        {
          "name": "SUSE-SR:2008:025",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
        },
        {
          "name": "36566",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36566"
        },
        {
          "name": "31769",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31769"
        },
        {
          "name": "1020858",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020858"
        },
        {
          "name": "oval:org.mitre.oval:def:10521",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3963",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b\u0027\u0027 (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.mysql.com/bug.php?id=35658",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=35658"
            },
            {
              "name": "MDVSA-2009:094",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "RHSA-2009:1067",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html"
            },
            {
              "name": "[oss-security] 20080909 Re: CVE request: MySQL empty bit-string literal server crash",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/09/09/7"
            },
            {
              "name": "ADV-2008-2554",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2554"
            },
            {
              "name": "USN-671-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-671-1"
            },
            {
              "name": "https://bugs.gentoo.org/237166",
              "refsource": "CONFIRM",
              "url": "https://bugs.gentoo.org/237166"
            },
            {
              "name": "mysql-bitstring-dos(45042)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042"
            },
            {
              "name": "DSA-1783",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1783"
            },
            {
              "name": "RHSA-2009:1289",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
            },
            {
              "name": "32769",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32769"
            },
            {
              "name": "32759",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32759"
            },
            {
              "name": "34907",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34907"
            },
            {
              "name": "[oss-security] 20080909 CVE request: MySQL empty bit-string literal server crash",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/09/09/4"
            },
            {
              "name": "SUSE-SR:2008:025",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
            },
            {
              "name": "36566",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36566"
            },
            {
              "name": "31769",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31769"
            },
            {
              "name": "1020858",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020858"
            },
            {
              "name": "oval:org.mitre.oval:def:10521",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3963",
    "datePublished": "2008-09-10T15:00:00",
    "dateReserved": "2008-09-09T00:00:00",
    "dateUpdated": "2024-08-07T10:00:41.996Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0114
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:16
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.htmlvendor-advisory, x_refsource_SUSE
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.813Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "name": "SUSE-SU-2012:0984",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "name": "SUSE-SU-2012:0984",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0114",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "SUSE-SU-2012:0984",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0114",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-12-12T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.813Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0101
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:16
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
https://exchange.xforce.ibmcloud.com/vulnerabilities/72520vdb-entry, x_refsource_XF
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/78378vdb-entry, x_refsource_OSVDB
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.htmlvendor-advisory, x_refsource_SUSE
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.585Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "mysql-serveruns1-dos(72520)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72520"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "78378",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/78378"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "name": "SUSE-SU-2012:0984",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "mysql-serveruns1-dos(72520)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72520"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "78378",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/78378"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "name": "SUSE-SU-2012:0984",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0101",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "mysql-serveruns1-dos(72520)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72520"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "78378",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/78378"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "SUSE-SU-2012:0984",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0101",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-12-12T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.585Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-0709
Vulnerability from cvelistv5
Published
2005-03-11 05:00
Modified
2024-08-07 21:21
Severity ?
Summary
MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:21:06.515Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2005-0009",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2005/0009/"
          },
          {
            "name": "DSA-707",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-707"
          },
          {
            "name": "20050310 Mysql CREATE FUNCTION libc arbitrary code execution.",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=111066115808506\u0026w=2"
          },
          {
            "name": "20050310 Mysql CREATE FUNCTION libc arbitrary code execution.",
            "tags": [
              "mailing-list",
              "x_refsource_VULNWATCH",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html"
          },
          {
            "name": "RHSA-2005:334",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html"
          },
          {
            "name": "101864",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
          },
          {
            "name": "SUSE-SA:2005:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html"
          },
          {
            "name": "USN-96-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/96-1/"
          },
          {
            "name": "RHSA-2005:348",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html"
          },
          {
            "name": "APPLE-SA-2005-08-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
          },
          {
            "name": "MDKSA-2005:060",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060"
          },
          {
            "name": "GLSA-200503-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml"
          },
          {
            "name": "oval:org.mitre.oval:def:10479",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479"
          },
          {
            "name": "APPLE-SA-2005-08-17",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
          },
          {
            "name": "12781",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12781"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-03-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "2005-0009",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2005/0009/"
        },
        {
          "name": "DSA-707",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-707"
        },
        {
          "name": "20050310 Mysql CREATE FUNCTION libc arbitrary code execution.",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=111066115808506\u0026w=2"
        },
        {
          "name": "20050310 Mysql CREATE FUNCTION libc arbitrary code execution.",
          "tags": [
            "mailing-list",
            "x_refsource_VULNWATCH"
          ],
          "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html"
        },
        {
          "name": "RHSA-2005:334",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html"
        },
        {
          "name": "101864",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
        },
        {
          "name": "SUSE-SA:2005:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html"
        },
        {
          "name": "USN-96-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/96-1/"
        },
        {
          "name": "RHSA-2005:348",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html"
        },
        {
          "name": "APPLE-SA-2005-08-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
        },
        {
          "name": "MDKSA-2005:060",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060"
        },
        {
          "name": "GLSA-200503-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml"
        },
        {
          "name": "oval:org.mitre.oval:def:10479",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479"
        },
        {
          "name": "APPLE-SA-2005-08-17",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
        },
        {
          "name": "12781",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12781"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2005-0709",
    "datePublished": "2005-03-11T05:00:00",
    "dateReserved": "2005-03-11T00:00:00",
    "dateUpdated": "2024-08-07T21:21:06.515Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-1849
Vulnerability from cvelistv5
Published
2010-06-07 20:00
Modified
2024-08-07 01:35
Severity ?
Summary
The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:35:53.805Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "oval:org.mitre.oval:def:7328",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=50974"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4435"
          },
          {
            "name": "APPLE-SA-2010-11-10-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.mysql.com/commits/106060"
          },
          {
            "name": "1024032",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1024032"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
          },
          {
            "name": "SUSE-SR:2010:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
          },
          {
            "name": "MDVSA-2010:107",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
          },
          {
            "name": "SUSE-SR:2010:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "oval:org.mitre.oval:def:7328",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=50974"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4435"
        },
        {
          "name": "APPLE-SA-2010-11-10-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.mysql.com/commits/106060"
        },
        {
          "name": "1024032",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1024032"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
        },
        {
          "name": "SUSE-SR:2010:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
        },
        {
          "name": "MDVSA-2010:107",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
        },
        {
          "name": "SUSE-SR:2010:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-1849",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "oval:org.mitre.oval:def:7328",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=50974",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=50974"
            },
            {
              "name": "http://support.apple.com/kb/HT4435",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4435"
            },
            {
              "name": "APPLE-SA-2010-11-10-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
            },
            {
              "name": "http://lists.mysql.com/commits/106060",
              "refsource": "MISC",
              "url": "http://lists.mysql.com/commits/106060"
            },
            {
              "name": "1024032",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1024032"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
            },
            {
              "name": "SUSE-SR:2010:021",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
            },
            {
              "name": "MDVSA-2010:107",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
            },
            {
              "name": "SUSE-SR:2010:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-1849",
    "datePublished": "2010-06-07T20:00:00",
    "dateReserved": "2010-05-06T00:00:00",
    "dateUpdated": "2024-08-07T01:35:53.805Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-4456
Vulnerability from cvelistv5
Published
2008-10-06 23:00
Modified
2024-08-07 10:17
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document. NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67.
References
http://www.securityfocus.com/archive/1/497885/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.mandriva.com/security/advisories?name=MDVSA-2009:094vendor-advisory, x_refsource_MANDRIVA
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
https://exchange.xforce.ibmcloud.com/vulnerabilities/45590vdb-entry, x_refsource_XF
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456vdb-entry, signature, x_refsource_OVAL
http://www.securityfocus.com/archive/1/497158/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/38517third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1783vendor-advisory, x_refsource_DEBIAN
http://bugs.mysql.com/bug.php?id=27884x_refsource_CONFIRM
http://ubuntu.com/usn/usn-897-1vendor-advisory, x_refsource_UBUNTU
http://www.redhat.com/support/errata/RHSA-2009-1289.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/32072third-party-advisory, x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlvendor-advisory, x_refsource_APPLE
http://www.securityfocus.com/archive/1/496842/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://support.apple.com/kb/HT4077x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2010-0110.htmlvendor-advisory, x_refsource_REDHAT
http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerabilityx_refsource_MISC
http://seclists.org/bugtraq/2008/Oct/0026.htmlmailing-list, x_refsource_BUGTRAQ
http://securityreason.com/securityalert/4357third-party-advisory, x_refsource_SREASON
http://secunia.com/advisories/34907third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/496877/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/36566third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/31486vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:17:09.714Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20081029 Re: MySQL command-line client HTML injection vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/497885/100/0/threaded"
          },
          {
            "name": "MDVSA-2009:094",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "mysql-commandline-xss(45590)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45590"
          },
          {
            "name": "oval:org.mitre.oval:def:11456",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456"
          },
          {
            "name": "20081008 Re: MySQL command-line client HTML injection vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/497158/100/0/threaded"
          },
          {
            "name": "38517",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38517"
          },
          {
            "name": "DSA-1783",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1783"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=27884"
          },
          {
            "name": "USN-897-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-897-1"
          },
          {
            "name": "RHSA-2009:1289",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
          },
          {
            "name": "32072",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32072"
          },
          {
            "name": "APPLE-SA-2010-03-29-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
          },
          {
            "name": "20080930 MySQL command-line client HTML injection vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/496842/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4077"
          },
          {
            "name": "RHSA-2010:0110",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability"
          },
          {
            "name": "20081004 RE: RE: MySQL command-line client HTML injection vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://seclists.org/bugtraq/2008/Oct/0026.html"
          },
          {
            "name": "4357",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4357"
          },
          {
            "name": "34907",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34907"
          },
          {
            "name": "20080930 RE: MySQL command-line client HTML injection vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/496877/100/0/threaded"
          },
          {
            "name": "36566",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36566"
          },
          {
            "name": "31486",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31486"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-09-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document.  NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20081029 Re: MySQL command-line client HTML injection vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/497885/100/0/threaded"
        },
        {
          "name": "MDVSA-2009:094",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "mysql-commandline-xss(45590)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45590"
        },
        {
          "name": "oval:org.mitre.oval:def:11456",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456"
        },
        {
          "name": "20081008 Re: MySQL command-line client HTML injection vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/497158/100/0/threaded"
        },
        {
          "name": "38517",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38517"
        },
        {
          "name": "DSA-1783",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1783"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=27884"
        },
        {
          "name": "USN-897-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-897-1"
        },
        {
          "name": "RHSA-2009:1289",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
        },
        {
          "name": "32072",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32072"
        },
        {
          "name": "APPLE-SA-2010-03-29-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
        },
        {
          "name": "20080930 MySQL command-line client HTML injection vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/496842/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4077"
        },
        {
          "name": "RHSA-2010:0110",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability"
        },
        {
          "name": "20081004 RE: RE: MySQL command-line client HTML injection vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://seclists.org/bugtraq/2008/Oct/0026.html"
        },
        {
          "name": "4357",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4357"
        },
        {
          "name": "34907",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34907"
        },
        {
          "name": "20080930 RE: MySQL command-line client HTML injection vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/496877/100/0/threaded"
        },
        {
          "name": "36566",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36566"
        },
        {
          "name": "31486",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31486"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4456",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document.  NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20081029 Re: MySQL command-line client HTML injection vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/497885/100/0/threaded"
            },
            {
              "name": "MDVSA-2009:094",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "mysql-commandline-xss(45590)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45590"
            },
            {
              "name": "oval:org.mitre.oval:def:11456",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456"
            },
            {
              "name": "20081008 Re: MySQL command-line client HTML injection vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/497158/100/0/threaded"
            },
            {
              "name": "38517",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38517"
            },
            {
              "name": "DSA-1783",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1783"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=27884",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=27884"
            },
            {
              "name": "USN-897-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-897-1"
            },
            {
              "name": "RHSA-2009:1289",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
            },
            {
              "name": "32072",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32072"
            },
            {
              "name": "APPLE-SA-2010-03-29-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
            },
            {
              "name": "20080930 MySQL command-line client HTML injection vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/496842/100/0/threaded"
            },
            {
              "name": "http://support.apple.com/kb/HT4077",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4077"
            },
            {
              "name": "RHSA-2010:0110",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
            },
            {
              "name": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability",
              "refsource": "MISC",
              "url": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability"
            },
            {
              "name": "20081004 RE: RE: MySQL command-line client HTML injection vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://seclists.org/bugtraq/2008/Oct/0026.html"
            },
            {
              "name": "4357",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4357"
            },
            {
              "name": "34907",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34907"
            },
            {
              "name": "20080930 RE: MySQL command-line client HTML injection vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/496877/100/0/threaded"
            },
            {
              "name": "36566",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36566"
            },
            {
              "name": "31486",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31486"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4456",
    "datePublished": "2008-10-06T23:00:00",
    "dateReserved": "2008-10-06T00:00:00",
    "dateUpdated": "2024-08-07T10:17:09.714Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3835
Vulnerability from cvelistv5
Published
2011-01-14 18:00
Modified
2024-08-07 03:26
Severity ?
Summary
MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table.
References
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.htmlx_refsource_CONFIRM
http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.htmlx_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://support.apple.com/kb/HT4723x_refsource_CONFIRM
http://secunia.com/advisories/42875third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1017-1vendor-advisory, x_refsource_UBUNTU
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txtvendor-advisory, x_refsource_TURBO
http://www.vupen.com/english/advisories/2011/0105vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:222vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2011-0164.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0170vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2011/dsa-2143vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/43676vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2011/0345vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/64843vdb-entry, x_refsource_XF
http://secunia.com/advisories/42936third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0825.htmlvendor-advisory, x_refsource_REDHAT
http://bugs.mysql.com/bug.php?id=55564x_refsource_MISC
https://bugzilla.redhat.com/show_bug.cgi?id=640819x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2010:223vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:26:11.487Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4723"
          },
          {
            "name": "42875",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42875"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "APPLE-SA-2011-06-23-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
          },
          {
            "name": "TLSA-2011-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
          },
          {
            "name": "ADV-2011-0105",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0105"
          },
          {
            "name": "MDVSA-2010:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "name": "DSA-2143",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2143"
          },
          {
            "name": "43676",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43676"
          },
          {
            "name": "ADV-2011-0345",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0345"
          },
          {
            "name": "mysql-uservariable-dos(64843)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64843"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "name": "RHSA-2010:0825",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=55564"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640819"
          },
          {
            "name": "MDVSA-2010:223",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4723"
        },
        {
          "name": "42875",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42875"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "APPLE-SA-2011-06-23-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
        },
        {
          "name": "TLSA-2011-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
        },
        {
          "name": "ADV-2011-0105",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0105"
        },
        {
          "name": "MDVSA-2010:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "name": "DSA-2143",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2143"
        },
        {
          "name": "43676",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43676"
        },
        {
          "name": "ADV-2011-0345",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0345"
        },
        {
          "name": "mysql-uservariable-dos(64843)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64843"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "name": "RHSA-2010:0825",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=55564"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640819"
        },
        {
          "name": "MDVSA-2010:223",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3835",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "http://support.apple.com/kb/HT4723",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4723"
            },
            {
              "name": "42875",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42875"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "APPLE-SA-2011-06-23-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
            },
            {
              "name": "TLSA-2011-3",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
            },
            {
              "name": "ADV-2011-0105",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0105"
            },
            {
              "name": "MDVSA-2010:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "DSA-2143",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2143"
            },
            {
              "name": "43676",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43676"
            },
            {
              "name": "ADV-2011-0345",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0345"
            },
            {
              "name": "mysql-uservariable-dos(64843)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64843"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "RHSA-2010:0825",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=55564",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=55564"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640819",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640819"
            },
            {
              "name": "MDVSA-2010:223",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3835",
    "datePublished": "2011-01-14T18:00:00",
    "dateReserved": "2010-10-07T00:00:00",
    "dateUpdated": "2024-08-07T03:26:11.487Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0120
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:16
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.697Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0120",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0120",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-12-12T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.697Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-1626
Vulnerability from cvelistv5
Published
2010-05-21 17:00
Modified
2024-08-07 01:28
Severity ?
Summary
MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:28:41.723Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "40257",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/40257"
          },
          {
            "name": "oval:org.mitre.oval:def:9490",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490"
          },
          {
            "name": "[oss-security] 20100518 Re: A mysql flaw.",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/05/18/4"
          },
          {
            "name": "ADV-2010-1194",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1194"
          },
          {
            "name": "1024004",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1024004"
          },
          {
            "name": "[oss-security] 20100510 Re: A mysql flaw.",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/05/10/2"
          },
          {
            "name": "MDVSA-2010:101",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=40980"
          },
          {
            "name": "RHSA-2010:0442",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
          },
          {
            "name": "SUSE-SR:2010:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
          },
          {
            "name": "SUSE-SR:2010:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL before 5.1.46 allows local users to delete the data and index files of another user\u0027s MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "40257",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/40257"
        },
        {
          "name": "oval:org.mitre.oval:def:9490",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490"
        },
        {
          "name": "[oss-security] 20100518 Re: A mysql flaw.",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/05/18/4"
        },
        {
          "name": "ADV-2010-1194",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1194"
        },
        {
          "name": "1024004",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1024004"
        },
        {
          "name": "[oss-security] 20100510 Re: A mysql flaw.",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/05/10/2"
        },
        {
          "name": "MDVSA-2010:101",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=40980"
        },
        {
          "name": "RHSA-2010:0442",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
        },
        {
          "name": "SUSE-SR:2010:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
        },
        {
          "name": "SUSE-SR:2010:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-1626",
    "datePublished": "2010-05-21T17:00:00",
    "dateReserved": "2010-04-29T00:00:00",
    "dateUpdated": "2024-08-07T01:28:41.723Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3683
Vulnerability from cvelistv5
Published
2011-01-11 19:00
Modified
2024-08-07 03:18
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:18:52.962Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html"
          },
          {
            "name": "MDVSA-2011:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=52512"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "name": "ADV-2011-0133",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0133"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
          },
          {
            "name": "MDVSA-2010:155",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "name": "SUSE-SR:2010:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628698"
          },
          {
            "name": "42625",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42625"
          },
          {
            "name": "SUSE-SR:2010:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
          },
          {
            "name": "mysql-ok-packet-dos(64683)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64683"
          },
          {
            "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html"
        },
        {
          "name": "MDVSA-2011:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=52512"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "name": "ADV-2011-0133",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0133"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
        },
        {
          "name": "MDVSA-2010:155",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "name": "SUSE-SR:2010:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628698"
        },
        {
          "name": "42625",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42625"
        },
        {
          "name": "SUSE-SR:2010:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
        },
        {
          "name": "mysql-ok-packet-dos(64683)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64683"
        },
        {
          "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3683",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html"
            },
            {
              "name": "MDVSA-2011:012",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=52512",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=52512"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "ADV-2011-0133",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0133"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
            },
            {
              "name": "MDVSA-2010:155",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "SUSE-SR:2010:021",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628698",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628698"
            },
            {
              "name": "42625",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42625"
            },
            {
              "name": "SUSE-SR:2010:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
            },
            {
              "name": "mysql-ok-packet-dos(64683)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64683"
            },
            {
              "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3683",
    "datePublished": "2011-01-11T19:00:00",
    "dateReserved": "2010-09-28T00:00:00",
    "dateUpdated": "2024-08-07T03:18:52.962Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0490
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:23
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/72531vdb-entry, x_refsource_XF
http://osvdb.org/78388vdb-entry, x_refsource_OSVDB
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/bid/51524vdb-entry, x_refsource_BID
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.htmlvendor-advisory, x_refsource_SUSE
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:31.105Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "mysql-serveruns9-dos(72531)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72531"
          },
          {
            "name": "78388",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/78388"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "51524",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51524"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "name": "SUSE-SU-2012:0984",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "mysql-serveruns9-dos(72531)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72531"
        },
        {
          "name": "78388",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/78388"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "51524",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51524"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "name": "SUSE-SU-2012:0984",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0490",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "mysql-serveruns9-dos(72531)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72531"
            },
            {
              "name": "78388",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/78388"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "51524",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51524"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "SUSE-SU-2012:0984",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0490",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2012-01-11T00:00:00",
    "dateUpdated": "2024-08-06T18:23:31.105Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-2942
Vulnerability from cvelistv5
Published
2009-10-22 16:00
Modified
2024-08-07 06:07
Severity ?
Summary
The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.
References
http://www.osvdb.org/59030vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/37047third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1910vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDVSA-2009:279vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:07:37.408Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "59030",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/59030"
          },
          {
            "name": "37047",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37047"
          },
          {
            "name": "DSA-1910",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1910"
          },
          {
            "name": "MDVSA-2009:279",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:279"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-10-27T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "59030",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/59030"
        },
        {
          "name": "37047",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37047"
        },
        {
          "name": "DSA-1910",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1910"
        },
        {
          "name": "MDVSA-2009:279",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:279"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2942",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "59030",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/59030"
            },
            {
              "name": "37047",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37047"
            },
            {
              "name": "DSA-1910",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1910"
            },
            {
              "name": "MDVSA-2009:279",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:279"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2942",
    "datePublished": "2009-10-22T16:00:00",
    "dateReserved": "2009-08-23T00:00:00",
    "dateUpdated": "2024-08-07T06:07:37.408Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3678
Vulnerability from cvelistv5
Published
2011-01-11 19:00
Modified
2024-08-07 03:18
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:18:52.963Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=54477"
          },
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "42596",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42596"
          },
          {
            "name": "USN-1017-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1017-1"
          },
          {
            "name": "MDVSA-2011:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
          },
          {
            "name": "RHSA-2011:0164",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
          },
          {
            "name": "ADV-2011-0170",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0170"
          },
          {
            "name": "ADV-2011-0133",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0133"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
          },
          {
            "name": "MDVSA-2010:155",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
          },
          {
            "name": "42936",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42936"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628172"
          },
          {
            "name": "SUSE-SR:2010:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
          },
          {
            "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=54477"
        },
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "42596",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42596"
        },
        {
          "name": "USN-1017-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1017-1"
        },
        {
          "name": "MDVSA-2011:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
        },
        {
          "name": "RHSA-2011:0164",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
        },
        {
          "name": "ADV-2011-0170",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0170"
        },
        {
          "name": "ADV-2011-0133",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0133"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
        },
        {
          "name": "MDVSA-2010:155",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
        },
        {
          "name": "42936",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42936"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628172"
        },
        {
          "name": "SUSE-SR:2010:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
        },
        {
          "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3678",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.mysql.com/bug.php?id=54477",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/bug.php?id=54477"
            },
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "42596",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42596"
            },
            {
              "name": "USN-1017-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1017-1"
            },
            {
              "name": "MDVSA-2011:012",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
            },
            {
              "name": "RHSA-2011:0164",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
            },
            {
              "name": "ADV-2011-0170",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0170"
            },
            {
              "name": "ADV-2011-0133",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0133"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
            },
            {
              "name": "MDVSA-2010:155",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
            },
            {
              "name": "42936",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42936"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628172",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628172"
            },
            {
              "name": "SUSE-SR:2010:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
            },
            {
              "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS  flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3678",
    "datePublished": "2011-01-11T19:00:00",
    "dateReserved": "2010-09-28T00:00:00",
    "dateUpdated": "2024-08-07T03:18:52.963Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-3469
Vulnerability from cvelistv5
Published
2006-07-18 23:00
Modified
2024-08-07 18:30
Severity ?
Summary
Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message.
References
http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlthird-party-advisory, x_refsource_CERT
http://security.gentoo.org/glsa/glsa-200608-09.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/bid/19032vdb-entry, x_refsource_BID
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlvendor-advisory, x_refsource_APPLE
http://secunia.com/advisories/31226third-party-advisory, x_refsource_SECUNIA
http://docs.info.apple.com/article.html?artnum=305214x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2008-0768.htmlvendor-advisory, x_refsource_REDHAT
http://www.ubuntu.com/usn/usn-321-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/21147third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/21366third-party-advisory, x_refsource_SECUNIA
http://bugs.mysql.com/bug.php?id=20729x_refsource_MISC
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694x_refsource_MISC
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827vdb-entry, signature, x_refsource_OVAL
http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.htmlx_refsource_CONFIRM
http://www.debian.org/security/2006/dsa-1112vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2007/0930vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/24479third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:30:34.063Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "TA07-072A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
          },
          {
            "name": "GLSA-200608-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200608-09.xml"
          },
          {
            "name": "19032",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19032"
          },
          {
            "name": "APPLE-SA-2007-03-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
          },
          {
            "name": "31226",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31226"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=305214"
          },
          {
            "name": "RHSA-2008:0768",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
          },
          {
            "name": "USN-321-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-321-1"
          },
          {
            "name": "21147",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21147"
          },
          {
            "name": "21366",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21366"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/bug.php?id=20729"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694"
          },
          {
            "name": "oval:org.mitre.oval:def:9827",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html"
          },
          {
            "name": "DSA-1112",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1112"
          },
          {
            "name": "ADV-2007-0930",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0930"
          },
          {
            "name": "24479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24479"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "TA07-072A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
        },
        {
          "name": "GLSA-200608-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200608-09.xml"
        },
        {
          "name": "19032",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19032"
        },
        {
          "name": "APPLE-SA-2007-03-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
        },
        {
          "name": "31226",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31226"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=305214"
        },
        {
          "name": "RHSA-2008:0768",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
        },
        {
          "name": "USN-321-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-321-1"
        },
        {
          "name": "21147",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21147"
        },
        {
          "name": "21366",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21366"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.mysql.com/bug.php?id=20729"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694"
        },
        {
          "name": "oval:org.mitre.oval:def:9827",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html"
        },
        {
          "name": "DSA-1112",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1112"
        },
        {
          "name": "ADV-2007-0930",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0930"
        },
        {
          "name": "24479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24479"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3469",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "TA07-072A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
            },
            {
              "name": "GLSA-200608-09",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200608-09.xml"
            },
            {
              "name": "19032",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19032"
            },
            {
              "name": "APPLE-SA-2007-03-13",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
            },
            {
              "name": "31226",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31226"
            },
            {
              "name": "http://docs.info.apple.com/article.html?artnum=305214",
              "refsource": "CONFIRM",
              "url": "http://docs.info.apple.com/article.html?artnum=305214"
            },
            {
              "name": "RHSA-2008:0768",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
            },
            {
              "name": "USN-321-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-321-1"
            },
            {
              "name": "21147",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21147"
            },
            {
              "name": "21366",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21366"
            },
            {
              "name": "http://bugs.mysql.com/bug.php?id=20729",
              "refsource": "MISC",
              "url": "http://bugs.mysql.com/bug.php?id=20729"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694",
              "refsource": "MISC",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694"
            },
            {
              "name": "oval:org.mitre.oval:def:9827",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html"
            },
            {
              "name": "DSA-1112",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1112"
            },
            {
              "name": "ADV-2007-0930",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0930"
            },
            {
              "name": "24479",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24479"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3469",
    "datePublished": "2006-07-18T23:00:00",
    "dateReserved": "2006-07-10T00:00:00",
    "dateUpdated": "2024-08-07T18:30:34.063Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-0710
Vulnerability from cvelistv5
Published
2005-03-11 05:00
Modified
2024-08-07 21:21
Severity ?
Summary
MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_init function.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:21:06.457Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2005-0009",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2005/0009/"
          },
          {
            "name": "20050310 Mysql CREATE FUNCTION mysql.func table arbitrary library injection",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=111065974004648\u0026w=2"
          },
          {
            "name": "DSA-707",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-707"
          },
          {
            "name": "RHSA-2005:334",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html"
          },
          {
            "name": "101864",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
          },
          {
            "name": "SUSE-SA:2005:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html"
          },
          {
            "name": "USN-96-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/96-1/"
          },
          {
            "name": "RHSA-2005:348",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html"
          },
          {
            "name": "20050310 Mysql CREATE FUNCTION mysql.func table arbitrary library injection",
            "tags": [
              "mailing-list",
              "x_refsource_VULNWATCH",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.html"
          },
          {
            "name": "APPLE-SA-2005-08-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
          },
          {
            "name": "MDKSA-2005:060",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060"
          },
          {
            "name": "mysql-udfinit-gain-access(19658)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19658"
          },
          {
            "name": "GLSA-200503-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml"
          },
          {
            "name": "oval:org.mitre.oval:def:10180",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10180"
          },
          {
            "name": "APPLE-SA-2005-08-17",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
          },
          {
            "name": "12781",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12781"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-03-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_init function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "2005-0009",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2005/0009/"
        },
        {
          "name": "20050310 Mysql CREATE FUNCTION mysql.func table arbitrary library injection",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=111065974004648\u0026w=2"
        },
        {
          "name": "DSA-707",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-707"
        },
        {
          "name": "RHSA-2005:334",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html"
        },
        {
          "name": "101864",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
        },
        {
          "name": "SUSE-SA:2005:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html"
        },
        {
          "name": "USN-96-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/96-1/"
        },
        {
          "name": "RHSA-2005:348",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html"
        },
        {
          "name": "20050310 Mysql CREATE FUNCTION mysql.func table arbitrary library injection",
          "tags": [
            "mailing-list",
            "x_refsource_VULNWATCH"
          ],
          "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.html"
        },
        {
          "name": "APPLE-SA-2005-08-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
        },
        {
          "name": "MDKSA-2005:060",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060"
        },
        {
          "name": "mysql-udfinit-gain-access(19658)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19658"
        },
        {
          "name": "GLSA-200503-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml"
        },
        {
          "name": "oval:org.mitre.oval:def:10180",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10180"
        },
        {
          "name": "APPLE-SA-2005-08-17",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
        },
        {
          "name": "12781",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12781"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2005-0710",
    "datePublished": "2005-03-11T05:00:00",
    "dateReserved": "2005-03-11T00:00:00",
    "dateUpdated": "2024-08-07T21:21:06.457Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-2575
Vulnerability from cvelistv5
Published
2015-04-16 16:00
Modified
2024-08-06 05:17
Severity ?
Summary
Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:17:27.448Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2015:0967",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20150417-0003/"
          },
          {
            "name": "DSA-3621",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3621"
          },
          {
            "name": "74075",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/74075"
          },
          {
            "name": "1032121",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032121"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"
          },
          {
            "name": "SUSE-SU-2015:0946",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-09T10:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "openSUSE-SU-2015:0967",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20150417-0003/"
        },
        {
          "name": "DSA-3621",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3621"
        },
        {
          "name": "74075",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/74075"
        },
        {
          "name": "1032121",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032121"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"
        },
        {
          "name": "SUSE-SU-2015:0946",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2015-2575",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2015:0967",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20150417-0003/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20150417-0003/"
            },
            {
              "name": "DSA-3621",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3621"
            },
            {
              "name": "74075",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/74075"
            },
            {
              "name": "1032121",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032121"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"
            },
            {
              "name": "SUSE-SU-2015:0946",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2015-2575",
    "datePublished": "2015-04-16T16:00:00",
    "dateReserved": "2015-03-20T00:00:00",
    "dateUpdated": "2024-08-06T05:17:27.448Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2102
Vulnerability from cvelistv5
Published
2012-08-17 00:00
Modified
2024-08-06 19:26
Severity ?
Summary
MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:26:07.204Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15"
          },
          {
            "name": "52931",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/52931"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html"
          },
          {
            "name": "[oss-security] 20120413 Re: CVE request: mysql: Server crash on HANDLER READ  NEXT after DELETE",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/04/13/7"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-02-10T22:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15"
        },
        {
          "name": "52931",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/52931"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html"
        },
        {
          "name": "[oss-security] 20120413 Re: CVE request: mysql: Server crash on HANDLER READ  NEXT after DELETE",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/04/13/7"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-2102",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/",
              "refsource": "MISC",
              "url": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15",
              "refsource": "MISC",
              "url": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15"
            },
            {
              "name": "52931",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/52931"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html"
            },
            {
              "name": "[oss-security] 20120413 Re: CVE request: mysql: Server crash on HANDLER READ  NEXT after DELETE",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/04/13/7"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2102",
    "datePublished": "2012-08-17T00:00:00",
    "dateReserved": "2012-04-04T00:00:00",
    "dateUpdated": "2024-08-06T19:26:07.204Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0119
Vulnerability from cvelistv5
Published
2012-01-18 22:00
Modified
2024-08-06 18:16
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
References
http://www.ubuntu.com/usn/USN-1397-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/48250third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2429vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.520Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1397-1"
          },
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "48250",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48250"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
          },
          {
            "name": "DSA-2429",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2429"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-20T17:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "USN-1397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1397-1"
        },
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "48250",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48250"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
        },
        {
          "name": "DSA-2429",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2429"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-0119",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1397-1"
            },
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "48250",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48250"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
            },
            {
              "name": "DSA-2429",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2429"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-0119",
    "datePublished": "2012-01-18T22:00:00",
    "dateReserved": "2011-12-12T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.520Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2011-01-14 19:02
Modified
2024-11-21 01:19
Severity ?
Summary
Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments."
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=55568
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
cve@mitre.orghttp://secunia.com/advisories/42875Vendor Advisory
cve@mitre.orghttp://support.apple.com/kb/HT4723
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2143
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:222
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:223
cve@mitre.orghttp://www.securityfocus.com/bid/43676
cve@mitre.orghttp://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0105
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0345
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=640808Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64844
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=55568
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42875Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4723
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2143
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:222
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:223
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/43676
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0105
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0345
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=640808Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64844
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.45b
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.27
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to \"materializing a derived table that required a temporary table for grouping\" and \"user variable assignments.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en MySQL v5.0 antes de v5.0.92, v5.1 antes de v5.1.51, y v5.5 antes de v5.5.6 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (por ca\u00edda del servidor) a trav\u00e9s de vectores relacionados con la materializaci\u00f3n de una tabla derivada que requiere una tabla temporal para la agrupaci\u00f3n y tambi\u00e9n relacionados con las asignaciones de variables de usuario."
    }
  ],
  "id": "CVE-2010-3834",
  "lastModified": "2024-11-21T01:19:42.810",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-14T19:02:27.983",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=55568"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640808"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=55568"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640808"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-12-31 05:00
Modified
2024-11-21 00:24
Severity ?
Summary
sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=22413Patch, Vendor Advisory
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.htmlVendor Advisory
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.htmlVendor Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.htmlThird Party Advisory
cve@mitre.orghttp://secunia.com/advisories/29443Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/30351Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/31687Third Party Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0364.htmlThird Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/28351Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/usn-588-1Third Party Advisory
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=22413Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29443Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30351Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31687Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0364.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28351Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-588-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A29B62B6-C1E2-4807-B259-03532829FB78",
              "versionEndExcluding": "5.0.32",
              "versionStartIncluding": "5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A9E6A4F-D24A-40D6-9952-B9AD0BBBB3BB",
              "versionEndExcluding": "5.1.14",
              "versionStartIncluding": "5.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
              "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY."
    },
    {
      "lang": "es",
      "value": "sql_select.cc en MySQL 5.0.x anterior a 5.0.32 y 5.1.x anterior a 5.1.14 permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante un EXPLAIN SELECT FROM en la tabla INFORMATION_SCHEMA como se ha demostrado utilizando ORDER BY."
    }
  ],
  "id": "CVE-2006-7232",
  "lastModified": "2024-11-21T00:24:41.667",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=22413"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/29443"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31687"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/28351"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-588-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=22413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/29443"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/28351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-588-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "This issue did not affect the MySQL packages as shipped in Red Hat Enterprise Linux 2.1, 3, and 4 as they did not support INFORMATION_SCHEMA, introduced in MySQL version 5.\n\nMySQL packages as shipped in Red Hat Enterprise Linux 5 were fixed via:\n\nhttps://rhn.redhat.com/errata/RHSA-2008-0364.html\n\nThe MySQL packages as shipped in Red Hat Application Stack v1 and v2 are based on upstream version which has the fix included.",
      "lastModified": "2008-07-25T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:34
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.45
mysql mysql 5.0.45b
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91
oracle mysql 5.0.92
oracle mysql 5.0.93
oracle mysql 5.0.94



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*",
              "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.0.x, v5.1.x y v5.5.x permite a usuarios locales afectar a la confidencialidad y a la integridad de los datos a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2012-0114",
  "lastModified": "2024-11-21T01:34:24.947",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:S/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 2.7,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:06.553",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-04-16 17:00
Modified
2024-11-21 02:27
Severity ?
Summary
Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "8B072472-B463-4647-885D-E40B0115C810",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:vmware:*:*:*:*:*",
              "matchCriteriaId": "3A0D502F-9D9C-4D97-B030-141DDE88D4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2682C8CC-279E-40E9-9370-CC387CE9FE21",
              "versionEndIncluding": "5.1.34",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Connectors en Oracle MySQL 5.1.34 y anteriores permite a usuarios remotos autenticados afectar la confidencialidad a trav\u00e9s de vectores desconocidos relacionados con Connector/J."
    }
  ],
  "id": "CVE-2015-2575",
  "lastModified": "2024-11-21T02:27:38.273",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-04-16T17:00:07.253",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3621"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/74075"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032121"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "https://security.netapp.com/advisory/ntap-20150417-0003/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3621"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/74075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032121"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20150417-0003/"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:55
Severity ?
Summary
MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit.
References
secalert@redhat.comhttp://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.htmlExploit
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=111066115808506&w=2
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-707Patch
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200503-19.xmlPatch
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2005:060
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2005_19_mysql.htmlPatch
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-334.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-348.html
secalert@redhat.comhttp://www.securityfocus.com/bid/12781Exploit, Patch
secalert@redhat.comhttp://www.trustix.org/errata/2005/0009/Patch
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479
secalert@redhat.comhttps://usn.ubuntu.com/96-1/
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=111066115808506&w=2
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-707Patch
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200503-19.xmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:060
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_19_mysql.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-334.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-348.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12781Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2005/0009/Patch
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/96-1/
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.3
mysql mysql 4.1.10
oracle mysql 3.23.49
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.18
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.23
oracle mysql 4.1.0
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit."
    }
  ],
  "id": "CVE-2005-0709",
  "lastModified": "2024-11-20T23:55:44.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=111066115808506\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2005/dsa-707"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12781"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.trustix.org/errata/2005/0009/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://usn.ubuntu.com/96-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=111066115808506\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2005/dsa-707"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12781"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.trustix.org/errata/2005/0009/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/96-1/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-14 19:01
Modified
2024-11-21 01:19
Severity ?
Summary
MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a "CREATE TABLE ... SELECT."
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=55826
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
cve@mitre.orghttp://secunia.com/advisories/42875Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42936
cve@mitre.orghttp://support.apple.com/kb/HT4723
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2143
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:222
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:223
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0825.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/43676
cve@mitre.orghttp://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0105
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0345
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=640751Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64845
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=55826
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42875Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4723
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2143
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:222
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:223
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0825.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/43676
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0105
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0345
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=640751Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64845
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.45b
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.27
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a \"CREATE TABLE ... SELECT.\""
    },
    {
      "lang": "es",
      "value": "MySQL v5.0 antes de v5.0.92, v5.1 antes de v5.1.51, y v5.5 antes de v5.5.6 no propaga adecuadamente los errores de tipo, lo cual permite provocar a atacantes remotos una denegaci\u00f3n de servicio (por ca\u00edda del servidor) a trav\u00e9s de argumentos especiales a las funciones de valores extremos, tales como (1) LEAST y (2) GREATEST, relacionados con KILL_BAD_DATA y un \"CREATE TABLE ... SELECT ....\""
    }
  ],
  "id": "CVE-2010-3833",
  "lastModified": "2024-11-21T01:19:42.640",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-14T19:01:15.763",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=55826"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640751"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64845"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=55826"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640751"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64845"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-11-30 17:30
Modified
2024-11-21 01:08
Severity ?
Summary
mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.
References
secalert@redhat.comhttp://bugs.mysql.com/47780
secalert@redhat.comhttp://bugs.mysql.com/48291
secalert@redhat.comhttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html
secalert@redhat.comhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
secalert@redhat.comhttp://marc.info/?l=oss-security&m=125881733826437&w=2
secalert@redhat.comhttp://marc.info/?l=oss-security&m=125883754215621&w=2
secalert@redhat.comhttp://marc.info/?l=oss-security&m=125901161824278&w=2
secalert@redhat.comhttp://secunia.com/advisories/37717
secalert@redhat.comhttp://secunia.com/advisories/38517
secalert@redhat.comhttp://secunia.com/advisories/38573
secalert@redhat.comhttp://support.apple.com/kb/HT4077
secalert@redhat.comhttp://ubuntu.com/usn/usn-897-1
secalert@redhat.comhttp://www.debian.org/security/2010/dsa-1997
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0109.html
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1397-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1107
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=540906
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/47780
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/48291
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=125881733826437&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=125883754215621&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=125901161824278&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37717
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38517
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38573
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4077
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-897-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2010/dsa-1997
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0109.html
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1107
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=540906
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html
Impacted products
Vendor Product Version
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.32
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.27
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.51a
oracle mysql 5.0.52
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.30



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51a:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD39950F-FBBF-4505-8FB5-EEF2886095F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement."
    },
    {
      "lang": "es",
      "value": "mysqld en MySQL v5.0.x anteriores a v5.0.88 y v5.1.x anteriores a v5.1.41 no (1) maneja apropiadamente los errores durante la ejecuci\u00f3n de determinadas peticiones SELECT con subpeticiones, y no (2) preserva determinadas \"flags\" (opciones) null_value durante la ejecuci\u00f3n de peticiones que usan la funci\u00f3n GeomFromWKB; lo que permite a usuarios autenticados remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de una petici\u00f3n modificada."
    }
  ],
  "id": "CVE-2009-4019",
  "lastModified": "2024-11-21T01:08:45.153",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-11-30T17:30:00.250",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.mysql.com/47780"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.mysql.com/48291"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=125883754215621\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=125901161824278\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/37717"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/38517"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/38573"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-897-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2010/dsa-1997"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1107"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540906"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/47780"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/48291"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=125883754215621\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=125901161824278\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/37717"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/38517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/38573"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-897-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2010/dsa-1997"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540906"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-08-28 18:04
Modified
2024-11-21 00:15
Severity ?
Summary
MySQL before 4.1.13 allows local users to cause a denial of service (persistent replication slave crash) via a query with multiupdate and subselects.
Impacted products
Vendor Product Version
mysql mysql 4.1.13



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL before 4.1.13 allows local users to cause a denial of service (persistent replication slave crash) via a query with multiupdate and subselects."
    },
    {
      "lang": "es",
      "value": "MySQL anterior a 4.1.13 permite a un usuario local provocar denegaci\u00f3n de servicio (caida de esclavo de replicaci\u00f3n persistente)a trav\u00e9s de una consulta con multiacutalizaciones y subselecciones."
    }
  ],
  "id": "CVE-2006-4380",
  "lastModified": "2024-11-21T00:15:49.177",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-28T18:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/10442"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.mysql.com/internals/26123"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21712"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21762"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016790"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1169"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:158"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19794"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10686"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/10442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.mysql.com/internals/26123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21712"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21762"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016790"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:158"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10686"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:34
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a las de los siguientes CVEs: CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485 y CVE-2012-0492."
    }
  ],
  "id": "CVE-2012-0115",
  "lastModified": "2024-11-21T01:34:25.073",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:06.647",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:35
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0485.
References
secalert_us@oracle.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
secalert_us@oracle.comhttp://osvdb.org/78393
secalert_us@oracle.comhttp://secunia.com/advisories/48250
secalert_us@oracle.comhttp://secunia.com/advisories/53372
secalert_us@oracle.comhttp://security.gentoo.org/glsa/glsa-201308-06.xml
secalert_us@oracle.comhttp://www.debian.org/security/2012/dsa-2429
secalert_us@oracle.comhttp://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
secalert_us@oracle.comhttp://www.securityfocus.com/bid/51516
secalert_us@oracle.comhttp://www.ubuntu.com/usn/USN-1397-1
secalert_us@oracle.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/72537
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/78393
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48250
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/53372
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201308-06.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2429
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/51516
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/72537
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0485."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a las de los siguientes CVEs: CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120 y CVE-2012-0485."
    }
  ],
  "id": "CVE-2012-0492",
  "lastModified": "2024-11-21T01:35:06.313",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:07.587",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://osvdb.org/78393"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securityfocus.com/bid/51516"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72537"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/78393"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51516"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72537"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-11-30 17:30
Modified
2024-11-21 01:08
Severity ?
Summary
MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.
References
secalert@redhat.comhttp://bugs.mysql.com/bug.php?id=32167
secalert@redhat.comhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
secalert@redhat.comhttp://lists.mysql.com/commits/89940
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
secalert@redhat.comhttp://marc.info/?l=oss-security&m=125908040022018&w=2
secalert@redhat.comhttp://marc.info/?l=oss-security&m=125908080222685&w=2
secalert@redhat.comhttp://secunia.com/advisories/38517
secalert@redhat.comhttp://secunia.com/advisories/38573
secalert@redhat.comhttp://support.apple.com/kb/HT4077
secalert@redhat.comhttp://ubuntu.com/usn/usn-897-1
secalert@redhat.comhttp://www.debian.org/security/2010/dsa-1997
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/11/19/3
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/11/24/6
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0109.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0110.html
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1397-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1107
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11116
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8156
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=32167
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/commits/89940
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=125908040022018&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=125908080222685&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38517
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38573
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4077
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-897-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2010/dsa-1997
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/19/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/24/6
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0109.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0110.html
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1107
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11116
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8156
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.32
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.30



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079."
    },
    {
      "lang": "es",
      "value": "MySQL v5.1.x anteriores a v5.1.41 permite a usuarios locales evitar ciertas comprobaciones de privilegios invocando CREATE TABLE en una tabla MyISAM con los argumentos (1) DATA DIRECTORY o (2) INDEX DIRECTORY modificados que estan originariamente asociados con pathnames (rutas) sin symlinks, y que pueden apuntar a tables creadas en un futuro en el cual un pathname (ruta) es modificado para contener un symlink a un subdirectorio del directorio home de datos de MySQL. Vulnerabilidad relacionada con una c\u00e1lculo incorrecto del valor mysql_unpacked_real_data_home value.  NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta al CVE-2008-4098 y CVE-2008-2079."
    }
  ],
  "id": "CVE-2009-4030",
  "lastModified": "2024-11-21T01:08:46.767",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-11-30T17:30:00.360",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.mysql.com/bug.php?id=32167"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.mysql.com/commits/89940"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=125908080222685\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/38517"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/38573"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-897-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2010/dsa-1997"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/24/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1107"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11116"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8156"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=32167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.mysql.com/commits/89940"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=125908080222685\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/38517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/38573"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-897-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2010/dsa-1997"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/24/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8156"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-02-27 23:02
Modified
2024-11-21 00:07
Severity ?
Summary
MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.
References
secalert@redhat.comhttp://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html
secalert@redhat.comhttp://bugs.mysql.com/bug.php?id=17667
secalert@redhat.comhttp://rst.void.ru/papers/advisory39.txt
secalert@redhat.comhttp://secunia.com/advisories/19034Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/19502
secalert@redhat.comhttp://secunia.com/advisories/19814
secalert@redhat.comhttp://secunia.com/advisories/20241
secalert@redhat.comhttp://secunia.com/advisories/20253
secalert@redhat.comhttp://secunia.com/advisories/20333
secalert@redhat.comhttp://secunia.com/advisories/20625
secalert@redhat.comhttp://secunia.com/advisories/30351
secalert@redhat.comhttp://securitytracker.com/id?1015693
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-1071
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-1073
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-1079
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:064
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0544.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0083.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0364.html
secalert@redhat.comhttp://www.securityfocus.com/bid/16850
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-274-2
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/0752
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/24966
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915
secalert@redhat.comhttps://usn.ubuntu.com/274-1/
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=17667
af854a3a-2127-422b-91ae-364da2661108http://rst.void.ru/papers/advisory39.txt
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19034Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19502
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19814
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20241
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20253
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20333
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20625
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30351
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015693
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1071
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1073
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1079
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:064
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0544.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0083.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0364.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/16850
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-274-2
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/0752
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/24966
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/274-1/
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.3
mysql mysql 4.1.8
mysql mysql 4.1.10
mysql mysql 4.1.12
mysql mysql 4.1.13
mysql mysql 4.1.14
mysql mysql 4.1.15
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
oracle mysql 3.23
oracle mysql 3.23.0
oracle mysql 3.23.1
oracle mysql 3.23.2
oracle mysql 3.23.3
oracle mysql 3.23.4
oracle mysql 3.23.5
oracle mysql 3.23.6
oracle mysql 3.23.7
oracle mysql 3.23.8
oracle mysql 3.23.9
oracle mysql 3.23.10
oracle mysql 3.23.11
oracle mysql 3.23.12
oracle mysql 3.23.13
oracle mysql 3.23.14
oracle mysql 3.23.15
oracle mysql 3.23.16
oracle mysql 3.23.17
oracle mysql 3.23.18
oracle mysql 3.23.19
oracle mysql 3.23.20
oracle mysql 3.23.21
oracle mysql 3.23.22
oracle mysql 3.23.23
oracle mysql 3.23.24
oracle mysql 3.23.25
oracle mysql 3.23.26
oracle mysql 3.23.27
oracle mysql 3.23.28
oracle mysql 3.23.29
oracle mysql 3.23.30
oracle mysql 3.23.31
oracle mysql 3.23.32
oracle mysql 3.23.33
oracle mysql 3.23.34
oracle mysql 3.23.35
oracle mysql 3.23.36
oracle mysql 3.23.37
oracle mysql 3.23.38
oracle mysql 3.23.39
oracle mysql 3.23.40
oracle mysql 3.23.41
oracle mysql 3.23.42
oracle mysql 3.23.43
oracle mysql 3.23.44
oracle mysql 3.23.45
oracle mysql 3.23.46
oracle mysql 3.23.47
oracle mysql 3.23.48
oracle mysql 3.23.49
oracle mysql 3.23.50
oracle mysql 3.23.51
oracle mysql 3.23.52
oracle mysql 3.23.53
oracle mysql 3.23.54
oracle mysql 3.23.55
oracle mysql 3.23.56
oracle mysql 3.23.57
oracle mysql 3.23.58
oracle mysql 3.23.59
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.16
oracle mysql 4.0.17
oracle mysql 4.0.18
oracle mysql 4.0.19
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.23
oracle mysql 4.0.24
oracle mysql 4.0.25
oracle mysql 4.0.26
oracle mysql 4.0.27
oracle mysql 4.1.0
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5
oracle mysql 4.1.6
oracle mysql 4.1.7
oracle mysql 4.1.9
oracle mysql 4.1.11
oracle mysql 4.1.16
oracle mysql 4.1.17
oracle mysql 4.1.18
oracle mysql 4.1.19
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DBBAC9-AA05-409F-82B2-A552A3417E45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "EA087258-8A5B-472E-B120-9B56415F8869",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "204CF85D-DFAD-4052-B24A-DCE09B32426E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B78C9D8-E6BC-4D80-8C29-219C1F151570",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A7DE48-60E6-42FE-8986-0DB1647C1BFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D5DFB7-1AA6-468D-A077-5BB4B32C92B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C786D54-7DEC-41B8-A778-BED9DA66C3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0F32D6-B2A9-4AC3-A4F9-E4A291AEC91A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1BD316B-5855-462D-B378-6AAF9817F23D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "38D864BB-32A6-44FC-870F-3663E53F2277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F5BA337-5845-4E3E-8DB5-AAB81A460376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BC06D07-8C16-48D4-A95E-8F40CFAE6514",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B9CEC-580F-4143-B111-032195BCC760",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F41E62F-A606-4842-985C-2B349C405E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.20:beta:*:*:*:*:*:*",
              "matchCriteriaId": "9EF1E839-E1C9-4A13-A6BA-6F8C56FDF148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "692E4E06-D559-4735-AED5-CE9E572CF608",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "77B463E6-DAD6-4013-8095-F0153F8B335F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A46F3F-7A97-4AE5-885B-15E25BC575C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "37512B4B-C428-4D30-AAF3-9557C7257967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B1527A-5039-470B-87DC-B02F557364A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function.  NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query."
    }
  ],
  "id": "CVE-2006-0903",
  "lastModified": "2024-11-21T00:07:37.083",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-02-27T23:02:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.mysql.com/bug.php?id=17667"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rst.void.ru/papers/advisory39.txt"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19034"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/19502"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/19814"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20241"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20253"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20333"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20625"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1015693"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2006/dsa-1071"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2006/dsa-1073"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2006/dsa-1079"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:064"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/16850"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-274-2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2006/0752"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24966"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://usn.ubuntu.com/274-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=17667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rst.void.ru/papers/advisory39.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19034"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19502"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19814"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20333"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015693"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:064"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/16850"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-274-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/0752"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24966"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/274-1/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 2.1 and 3:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=194613\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n\nThis issue has been fixed for Red Hat Enterprise Linux 4 in RHSA-2006:0544.",
      "lastModified": "2006-09-19T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-08-05 15:29
Modified
2024-11-21 03:09
Summary
If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server.
Impacted products
Vendor Product Version
mantisbt mantisbt 2.5.2
mariadb mariadb *
mysql mysql *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "146401B2-FDE4-4ACC-9CFA-E7BEE11D1FCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2177DDD2-8830-4838-9945-0368DBDD1815",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA450156-3EEF-4F22-8F28-2E0A55C81FF6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the \u0027admin\u0027 directory (as recommended in the \"Post-installation and upgrade tasks\" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL\u0027s \"connect file read\" feature to remotely access files on the MantisBT server."
    },
    {
      "lang": "es",
      "value": "Si tras la correcta instalaci\u00f3n de MantisBT en su versi\u00f3n 2.5.2 en MySQL/MariaDB el administrador no elimina el directorio \"admin\" (tal y como se recomienda en la secci\u00f3n \"Post-installation and upgrade tasks\" de la MantisBT Admin Guide) y el cliente MySQL tiene una configuraci\u00f3n local_infile habilitada (en php.ini mysqli.allow_local_infile o el archivo de configuraci\u00f3n del cliente MySQL, dependiendo de la configuraci\u00f3n de PHP), un atacante podr\u00eda aprovecharse de la funcionalidad \"connect file read\" de MySQL para acceder de forma remota a los archivos del servidor de MantisBT."
    }
  ],
  "id": "CVE-2017-12419",
  "lastModified": "2024-11-21T03:09:26.493",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-08-05T15:29:00.177",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://openwall.com/lists/oss-security/2017/08/04/6"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/100142"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://mantisbt.org/bugs/view.php?id=23173"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://openwall.com/lists/oss-security/2017/08/04/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/100142"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://mantisbt.org/bugs/view.php?id=23173"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:34
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la confidencialidad y a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a la CVE-2012-0118."
    }
  ],
  "id": "CVE-2012-0113",
  "lastModified": "2024-11-21T01:34:24.820",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:06.507",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-08-18 20:04
Modified
2024-11-21 00:15
Severity ?
Summary
MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine's definer instead of the routine's caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=18630Exploit
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html
cve@mitre.orghttp://lists.mysql.com/commits/7918
cve@mitre.orghttp://secunia.com/advisories/21506Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/21770Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22080Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30351Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1016709
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_23_sr.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0083.htmlVendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0364.htmlVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/19559Exploit
cve@mitre.orghttp://www.ubuntu.com/usn/usn-338-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3306Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28442
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=18630Exploit
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/commits/7918
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21506Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21770Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22080Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30351Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016709
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_23_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0083.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0364.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19559Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-338-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3306Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28442
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105
Impacted products
Vendor Product Version
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.1.5
oracle mysql 5.0.0
oracle mysql 5.1.6
oracle mysql 5.1.9
oracle mysql 5.1.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine\u0027s definer instead of the routine\u0027s caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE."
    },
    {
      "lang": "es",
      "value": "MySQL anterior a 5.0.25 y 5.1 anterior a 5.1.12 eval\u00faa los argumentos de rutinas suid en el contexto de seguridad del creador de la rutina en lugar del de aquel que llama a la rutina, lo que permite a usuarios autenticados remotamente escalar privilegios a trav\u00e9s de una rutina que ha sido puesta a su disposici\u00f3n utilizando GRANT EXECUTE."
    }
  ],
  "id": "CVE-2006-4227",
  "lastModified": "2024-11-21T00:15:26.370",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-18T20:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=18630"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.mysql.com/commits/7918"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21506"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21770"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22080"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016709"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/19559"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-338-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3306"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28442"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=18630"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.mysql.com/commits/7918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21506"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016709"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/19559"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-338-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "This issue did not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.\n\nIssue was addressed in MySQL packages as shipped in Red Hat Enterprise Linux 5 via:\n\nhttps://rhn.redhat.com/errata/RHSA-2008-0364.html",
      "lastModified": "2008-07-25T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:55
Severity ?
Summary
MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_init function.
References
secalert@redhat.comhttp://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.htmlExploit
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=111065974004648&w=2
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-707Patch
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200503-19.xmlPatch
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2005:060
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2005_19_mysql.htmlPatch
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-334.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-348.html
secalert@redhat.comhttp://www.securityfocus.com/bid/12781Patch
secalert@redhat.comhttp://www.trustix.org/errata/2005/0009/
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/19658
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10180
secalert@redhat.comhttps://usn.ubuntu.com/96-1/
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=111065974004648&w=2
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-707Patch
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200503-19.xmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:060
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_19_mysql.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-334.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-348.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12781Patch
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2005/0009/
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/19658
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10180
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/96-1/
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.3
mysql mysql 4.1.10
oracle mysql 3.23.49
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.18
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.23
oracle mysql 4.1.0
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_init function."
    }
  ],
  "id": "CVE-2005-0710",
  "lastModified": "2024-11-20T23:55:44.983",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=111065974004648\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2005/dsa-707"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12781"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.trustix.org/errata/2005/0009/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19658"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10180"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://usn.ubuntu.com/96-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=111065974004648\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2005/dsa-707"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12781"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2005/0009/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10180"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/96-1/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-09-18 15:04
Modified
2024-11-21 00:50
Severity ?
Summary
MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.
References
secalert@redhat.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25Issue Tracking, Third Party Advisory
secalert@redhat.comhttp://bugs.mysql.com/bug.php?id=32167Issue Tracking, Patch, Vendor Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.htmlThird Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/32578Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/32759Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/32769Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/38517Not Applicable
secalert@redhat.comhttp://ubuntu.com/usn/usn-897-1Third Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1662Third Party Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:094Broken Link
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2008/09/09/20Mailing List, Third Party Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2008/09/16/3Mailing List, Third Party Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2009-1067.htmlThird Party Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0110.htmlThird Party Advisory
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1397-1
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-671-1Third Party Advisory
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/45649
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=32167Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32578Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32759Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32769Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38517Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-897-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1662Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:094Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/09/09/20Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/09/16/3Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1067.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0110.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-671-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/45649
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591
Impacted products
Vendor Product Version
canonical ubuntu_linux 6.06
canonical ubuntu_linux 7.10
canonical ubuntu_linux 8.04
canonical ubuntu_linux 8.10
canonical ubuntu_linux 9.04
canonical ubuntu_linux 9.10
debian debian_linux 5.0
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.28
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.34
oracle mysql 5.0.36
oracle mysql 5.0.38
oracle mysql 5.0.40
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.44
oracle mysql 5.0.45
oracle mysql 5.0.46
oracle mysql 5.0.48
oracle mysql 5.0.50
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.56
oracle mysql 5.0.58
oracle mysql 5.0.60
oracle mysql 5.0.62
oracle mysql 5.0.64
oracle mysql 5.0.66



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
              "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB92A552-079E-4A5E-B65E-8A6C956FC7DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5CD839-1C18-44F2-836F-97B85572D491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "4BA355E8-593E-470C-B565-60CD51B14C3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF30535-45D3-4845-8B7C-16F7B6D05F63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "87BAAF59-A8F5-46AB-9CAC-E0F76B47D942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "60540719-8329-47E4-820F-8B4E4AA55AF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "7147148B-BD26-4280-9B3F-1B27551E0CAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "DC81D22D-72FE-4FEC-8277-A994B184B91C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "B15A96B9-3982-49DF-A836-1DBC3FD29EF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "A02DEBB1-65A5-4422-8B75-E8C86EA0B947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "56225075-5A65-409E-AFC9-CACA381EAC29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB11E34-4045-4ACA-AD7D-48B70D13CD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D2FC440-4D06-4CE2-BE20-A46EB196182F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "455E364E-5010-47D9-8F09-58FE4B15615B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097."
    },
    {
      "lang": "es",
      "value": "MySQL anterior a 5.0.67, permite a usuarios locales evitar determinadas comprobaciones de privilegios haciendo una llamada CREATE TABLE en una tabla MyISAM que modifica los argumentos (1) DATA DIRECTORY o (2) INDEX DIRECTORY que est\u00e1n asociados originalmente con los nombres de ruta (pathname) sin enlaces simb\u00f3licos, y que pueden apuntar a tablas creadas despu\u00e9s de que un nombre de ruta sea modificado para tener un enlace simb\u00f3lico a un subdirectorio del directorio de datos inicial de MySQL. NOTA: esta vulnerabilidad es debida a que no se solucion\u00f3 completamente la vulnerabilidad CVE-2008-4097."
    }
  ],
  "id": "CVE-2008-4098",
  "lastModified": "2024-11-21T00:50:53.650",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-09-18T15:04:27.407",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=32167"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/32578"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/32759"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/32769"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/38517"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://ubuntu.com/usn/usn-897-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1662"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2008/09/09/20"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2008/09/16/3"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-671-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45649"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=32167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/32578"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/32759"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/32769"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/38517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://ubuntu.com/usn/usn-897-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1662"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2008/09/09/20"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2008/09/16/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-671-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45649"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "This issue was addressed in Red Hat Enterprise Linux 4 via https://rhn.redhat.com/errata/RHSA-2010-0110.html and in Red Hat Application Stack v2 via https://rhn.redhat.com/errata/RHSA-2009-1067.html .\n\nIn Red Hat Enterprise Linux 5, issue CVE-2008-2079 was fixed without introducing CVE-2008-4098 in https://rhn.redhat.com/errata/RHSA-2009-1289.html .",
      "lastModified": "2010-02-17T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-06-08 00:30
Modified
2024-11-21 01:15
Severity ?
Summary
Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=53237
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
cve@mitre.orghttp://securitytracker.com/id?1024033
cve@mitre.orghttp://support.apple.com/kb/HT4435
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:107
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0442.html
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10846
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6693
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=53237
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1024033
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4435
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:107
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0442.html
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10846
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6693
Impacted products
Vendor Product Version
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.24
mysql mysql 5.0.45b
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.27
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.41
oracle mysql 5.0.45
oracle mysql 5.0.51
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.30
oracle mysql 5.1.33
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de b\u00fafer en MySQL v5.0 a v5.0.91 y v5.1 antes de v5.1.47 permite ejecutar c\u00f3digo de su elecci\u00f3n a usuarios remotos autenticados mediante un comando COM_FIELD_LIST con un nombre de tabla larga."
    }
  ],
  "id": "CVE-2010-1850",
  "lastModified": "2024-11-21T01:15:18.987",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-06-08T00:30:01.710",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=53237"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1024033"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4435"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10846"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6693"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=53237"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1024033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4435"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10846"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6693"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-11-30 17:30
Modified
2024-11-21 00:58
Severity ?
Summary
sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=39277Exploit
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
cve@mitre.orghttp://lists.mysql.com/commits/59711Exploit
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
cve@mitre.orghttp://marc.info/?l=oss-security&m=125908040022018&w=2
cve@mitre.orghttp://secunia.com/advisories/38517
cve@mitre.orghttp://support.apple.com/kb/HT4077
cve@mitre.orghttp://ubuntu.com/usn/usn-897-1
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:044
cve@mitre.orghttp://www.securityfocus.com/bid/38043
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2010/1107
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=543619
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=39277Exploit
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/commits/59711Exploit
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=125908040022018&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38517
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4077
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-897-1
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:044
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/38043
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1107
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=543619
Impacted products
Vendor Product Version
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.32
mysql mysql 6.0.9
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.27
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.30
oracle mysql 6.0.0
oracle mysql 6.0.1
oracle mysql 6.0.2
oracle mysql 6.0.3
oracle mysql 6.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:6.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E9E9D88-6640-45E8-83AA-7B9C0936D905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F48E7355-2D9A-454D-AE66-B0AE015E31A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E51BF67A-BAEC-48F8-9290-67C6C5B8442E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5C6A2F-DEAE-470D-8888-0E9076CCA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C09231E-8759-4DFB-AA8D-17A1C6D43AC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "81592813-78D9-4366-AD2E-94677D93F599",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink."
    },
    {
      "lang": "es",
      "value": "sql/sql_table.cc en MySQL v5.0.x hasta la v5.0.88, v5.1.x hasta la v5.1.41, y v6.0 anteriores a v6.0.9-alpha, cuando el directorio de datos \"home\" contiene un enlace simb\u00f3lico a un sistema de ficheros diferente, permite a usuarios autenticados remotamente saltar las restricciones de acceso implementadas al invocar CREATE TABLE con un argumento (1) DATA DIRECTORY o (2) INDEX DIRECTORY referido a un subdirectorio que requiera el seguimiento de este enlace simb\u00f3lico."
    }
  ],
  "id": "CVE-2008-7247",
  "lastModified": "2024-11-21T00:58:38.827",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-11-30T17:30:00.217",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=39277"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://lists.mysql.com/commits/59711"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/38517"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://ubuntu.com/usn/usn-897-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:044"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/38043"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/1107"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=39277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://lists.mysql.com/commits/59711"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/38517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-897-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:044"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/38043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543619"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect the versions of mysql as shipped with Red Hat Enterprise Linux 3, 4, or 5.",
      "lastModified": "2009-12-21T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-11 20:00
Modified
2024-11-21 01:19
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables with nullable columns while using InnoDB, which triggers an assertion failure.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=54044
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
cve@mitre.orghttp://secunia.com/advisories/42875Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42936Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2143
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:155
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:222
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:012
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2010/09/28/10Exploit
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0825.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/42598
cve@mitre.orghttp://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0105Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0133Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0345Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=628192Exploit
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64686
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=54044
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42875Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2143
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:155
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:222
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:012
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/28/10Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0825.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/42598
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0105Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0133Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0345Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=628192Exploit
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64686
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables with nullable columns while using InnoDB, which triggers an assertion failure."
    },
    {
      "lang": "es",
      "value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio mysqld) mediante la creaci\u00f3n de tablas temporales con columnas que aceptan valores NULL mientras se utiliza InnoDB, que desencadena un fallo de aserci\u00f3n."
    }
  ],
  "id": "CVE-2010-3680",
  "lastModified": "2024-11-21T01:19:22.657",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-11T20:00:01.493",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=54044"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/42598"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628192"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64686"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=54044"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42598"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64686"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-07-13 17:30
Modified
2024-11-21 01:04
Severity ?
Summary
Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request. NOTE: some of these details are obtained from third party information.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.htmlExploit
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
cve@mitre.orghttp://secunia.com/advisories/35767Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/36566
cve@mitre.orghttp://secunia.com/advisories/38517
cve@mitre.orghttp://securitytracker.com/id?1022533
cve@mitre.orghttp://support.apple.com/kb/HT4077
cve@mitre.orghttp://ubuntu.com/usn/usn-897-1
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2009:179
cve@mitre.orghttp://www.osvdb.org/55734Patch
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2009-1289.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0110.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/504799/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/35609Exploit
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1857
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/51614
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35767Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36566
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38517
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1022533
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4077
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-897-1
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:179
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/55734Patch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1289.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0110.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/504799/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/35609Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1857
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/51614
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.2
mysql mysql 4.1.3
mysql mysql 4.1.8
mysql mysql 4.1.10
mysql mysql 4.1.12
mysql mysql 4.1.13
mysql mysql 4.1.14
mysql mysql 4.1.15
mysql mysql 4.1.23
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.16
oracle mysql 4.0.17
oracle mysql 4.0.18
oracle mysql 4.0.19
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.23
oracle mysql 4.0.24
oracle mysql 4.0.25
oracle mysql 4.0.26
oracle mysql 4.0.27
oracle mysql 4.1.0
oracle mysql 4.1.1
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5
oracle mysql 4.1.6
oracle mysql 4.1.7
oracle mysql 4.1.9
oracle mysql 4.1.11
oracle mysql 4.1.16
oracle mysql 4.1.17
oracle mysql 4.1.18
oracle mysql 4.1.19
oracle mysql 4.1.20
oracle mysql 4.1.21
oracle mysql 4.1.22
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.27
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.51a
oracle mysql 5.0.52
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC1D0C0F-08EF-4AFA-BBEA-CCDF04F90E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8105AE3-7FF6-43C5-9B47-29ACD4DD7C3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "48BA51FF-B163-4522-8D78-AF9C05D50511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51a:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD39950F-FBBF-4505-8FB5-EEF2886095F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de formato de cadena en la funci\u00f3n dispatch_command en libmysqld/sql_parse.cc en mysqld de MySQL v4.0.0 hasta v5.0.83 permiten a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (mediante ca\u00edda del demonio) y, posiblemente otros efectos no especificados, a trav\u00e9s de especificadores de formato de cadena en el nombre de base de datos en una petici\u00f3n (1) COM_CREATE_DB o (2) COM_DROP_DB. NOTA: Algunos de estos detalles se obtienen a partir de informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2009-2446",
  "lastModified": "2024-11-21T01:04:53.493",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.5,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-07-13T17:30:00.217",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35767"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/36566"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/38517"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1022533"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://ubuntu.com/usn/usn-897-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:179"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osvdb.org/55734"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/504799/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/35609"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2009/1857"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51614"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35767"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36566"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/38517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1022533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-897-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osvdb.org/55734"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/504799/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/35609"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/1857"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51614"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2446\n\nThis issue was addressed for Red hat Enterprise Linux 5 by https://rhn.redhat.com/errata/RHSA-2009-1289.html and Red Hat Enterprise Linux 4 by https://rhn.redhat.com/errata/RHSA-2010-0110.html .\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, future MySQL package updates may address this flaw for Red Hat Enterprise Linux 3 and Red Hat Application Stack 2.",
      "lastModified": "2010-02-17T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-10-22 16:30
Modified
2024-11-21 01:06
Severity ?
Summary
The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.
Impacted products
Vendor Product Version
mysql-ocaml mysql-ocaml 1.0.4
mysql mysql *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql-ocaml:mysql-ocaml:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CED10CEF-B0EB-4164-9061-EFA0F97497AE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA450156-3EEF-4F22-8F28-2E0A55C81FF6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings."
    },
    {
      "lang": "es",
      "value": "El mysql-ocaml bindings v1.0.4 para MySQL no soporta adecuadamente la funci\u00f3n mysql_real_escape_string, lo que puede permitir a atacantes remotos elevar vulnerabilidades de escape incluyendo codificaciones de caracteres multibyte."
    }
  ],
  "id": "CVE-2009-2942",
  "lastModified": "2024-11-21T01:06:06.920",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-10-22T16:30:00.267",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37047"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1910"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:279"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/59030"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1910"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:279"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/59030"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-06-08 00:30
Modified
2024-11-21 01:15
Severity ?
Summary
The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=50974
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
cve@mitre.orghttp://lists.mysql.com/commits/106060
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
cve@mitre.orghttp://securitytracker.com/id?1024032
cve@mitre.orghttp://support.apple.com/kb/HT4435
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:107
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=50974
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/commits/106060
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1024032
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4435
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:107
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328
Impacted products
Vendor Product Version
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.24
mysql mysql 5.0.45b
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.27
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.41
oracle mysql 5.0.45
oracle mysql 5.0.51
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.30
oracle mysql 5.1.33
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n my_net_skip_rest en sql/net_serv.cc en MySQL v5.0 a v5.0.91 y v5.1 antes de v5.1.47 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (mediante excesivo consumo de CPU y ancho de banda) mediante el env\u00edo de una gran cantidad de paquetes que exceden la longitud m\u00e1xima."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/371.html\r\n\r\n\u0027CWE-371: State Issues\u0027",
  "id": "CVE-2010-1849",
  "lastModified": "2024-11-21T01:15:18.843",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-06-08T00:30:01.663",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=50974"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.mysql.com/commits/106060"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1024032"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4435"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=50974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.mysql.com/commits/106060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1024032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4435"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-05-05 16:20
Modified
2024-11-21 00:46
Severity ?
Summary
MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
References
secalert@redhat.comhttp://bugs.mysql.com/bug.php?id=32167Exploit, Patch, Vendor Advisory
secalert@redhat.comhttp://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.htmlVendor Advisory
secalert@redhat.comhttp://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.htmlVendor Advisory
secalert@redhat.comhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.htmlVendor Advisory
secalert@redhat.comhttp://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.htmlVendor Advisory
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2009/Sep/msg00004.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.htmlThird Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/30134Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/31066Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/31226Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/31687Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/32222Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/32769Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/36566Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/36701Third Party Advisory
secalert@redhat.comhttp://support.apple.com/kb/HT3216Third Party Advisory
secalert@redhat.comhttp://support.apple.com/kb/HT3865Third Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1608Third Party Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:149Third Party Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:150Third Party Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0505.htmlThird Party Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0510.htmlThird Party Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0768.htmlThird Party Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2009-1289.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/29106Patch, Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securityfocus.com/bid/31681Patch, Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id?1019995Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-671-1Third Party Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1472/referencesThird Party Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/2780Third Party Advisory
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/42267Third Party Advisory, VDB Entry
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=32167Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30134Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31066Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31226Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31687Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32222Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32769Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36566Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36701Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3216Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3865Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1608Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:149Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:150Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0505.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0510.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0768.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1289.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/29106Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31681Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019995Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-671-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1472/referencesThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2780Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/42267Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C895D3-2949-4B14-B059-F0E29D977982",
              "versionEndExcluding": "4.1.24",
              "versionStartIncluding": "4.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "027481EF-83CF-40AF-8223-572B7915845F",
              "versionEndExcluding": "5.0.60",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F5416CD-0CEB-4C41-AE28-2A9C2B5600A7",
              "versionEndExcluding": "5.1.24",
              "versionStartIncluding": "5.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6A87CA-DA11-4B91-A3E9-6437042BDC1A",
              "versionEndExcluding": "6.0.5",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
              "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future."
    },
    {
      "lang": "es",
      "value": "MySQL 4.1.x anterior a 4.1.24, 5.0.x antes de 5.0.60, 5.1.x anterior a 5.1.24 y 6.0.x antes de 6.0.5 permite a usuarios locales evitar ciertas comprobaciones de privilegios llamando a CREATE TABLE en una tabla MyISAM con argumentos (1) DATA DIRECTORY or (2) INDEX DIRECTORY modificados que est\u00e1n dentro del directorio MySQL home data, que puede apuntar a tablas que se crear\u00e1n en el futuro."
    }
  ],
  "evaluatorComment": "Per http://www.securityfocus.com/bid/29106 and http://secunia.com/advisories/32222, this vulnerability is remotely exploitable.",
  "id": "CVE-2008-2079",
  "lastModified": "2024-11-21T00:46:02.103",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-05-05T16:20:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=32167"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/30134"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31066"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31226"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31687"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/32222"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/32769"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/36566"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/36701"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT3216"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT3865"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1608"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0505.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0510.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/29106"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/31681"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1019995"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-671-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/1472/references"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2780"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=32167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/30134"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31066"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/32222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/32769"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/36566"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/36701"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT3216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT3865"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1608"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0505.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0510.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/29106"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/31681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1019995"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-671-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/1472/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2780"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "This issue did not affect MySQL as supplied with Red Hat Enterprise Linux 3.\n\nThis issue was addressed for Red Hat Enterprise Linux 4, 5, and Red Hat Application Stack v1, v2:\nhttps://rhn.redhat.com/cve/CVE-2008-2079.html\n",
      "lastModified": "2009-09-02T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-16 01:19
Modified
2024-11-21 00:31
Severity ?
Summary
MySQL before 5.1.18 allows remote authenticated users without SELECT privileges to obtain sensitive information from partitioned tables via an ALTER TABLE statement.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
oracle mysql 5.1.6
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL before 5.1.18 allows remote authenticated users without SELECT privileges to obtain sensitive information from partitioned tables via an ALTER TABLE statement."
    },
    {
      "lang": "es",
      "value": "MySQL anterior a 5.1.18 permite a usuarios autenticados remotamente sin privilegios SELECT obtener informaci\u00f3n sensible desde tablas particionadas mediante una sentencia ALTER TABLE."
    }
  ],
  "id": "CVE-2007-2693",
  "lastModified": "2024-11-21T00:31:25.567",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-16T01:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=23675"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25301"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24008"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018071"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1804"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34349"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=23675"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25301"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24008"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1804"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34349"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. These issues did not affect the versions of mysql as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.",
      "lastModified": "2007-06-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-05-05 12:46
Modified
2024-11-21 00:09
Severity ?
Summary
sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
References
security@debian.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939Patch
security@debian.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.htmlPatch
security@debian.orghttp://docs.info.apple.com/article.html?artnum=305214
security@debian.orghttp://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
security@debian.orghttp://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
security@debian.orghttp://secunia.com/advisories/19929Patch, Vendor Advisory
security@debian.orghttp://secunia.com/advisories/20002
security@debian.orghttp://secunia.com/advisories/20073
security@debian.orghttp://secunia.com/advisories/20076
security@debian.orghttp://secunia.com/advisories/20223
security@debian.orghttp://secunia.com/advisories/20241
security@debian.orghttp://secunia.com/advisories/20253
security@debian.orghttp://secunia.com/advisories/20333
security@debian.orghttp://secunia.com/advisories/20424
security@debian.orghttp://secunia.com/advisories/20457
security@debian.orghttp://secunia.com/advisories/20625
security@debian.orghttp://secunia.com/advisories/20762
security@debian.orghttp://secunia.com/advisories/24479
security@debian.orghttp://secunia.com/advisories/29847
security@debian.orghttp://securityreason.com/securityalert/839
security@debian.orghttp://securitytracker.com/id?1016016Patch
security@debian.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
security@debian.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
security@debian.orghttp://www.debian.org/security/2006/dsa-1071
security@debian.orghttp://www.debian.org/security/2006/dsa-1073
security@debian.orghttp://www.debian.org/security/2006/dsa-1079
security@debian.orghttp://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
security@debian.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:084
security@debian.orghttp://www.novell.com/linux/security/advisories/2006-06-02.html
security@debian.orghttp://www.osvdb.org/25228
security@debian.orghttp://www.redhat.com/support/errata/RHSA-2006-0544.html
security@debian.orghttp://www.securityfocus.com/archive/1/432734/100/0/threaded
security@debian.orghttp://www.securityfocus.com/archive/1/434164/100/0/threaded
security@debian.orghttp://www.securityfocus.com/bid/17780
security@debian.orghttp://www.trustix.org/errata/2006/0028
security@debian.orghttp://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
security@debian.orghttp://www.vupen.com/english/advisories/2006/1633
security@debian.orghttp://www.vupen.com/english/advisories/2007/0930
security@debian.orghttp://www.vupen.com/english/advisories/2008/1326/references
security@debian.orghttp://www.wisec.it/vulns.php?page=8Patch
security@debian.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26228
security@debian.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036
security@debian.orghttps://usn.ubuntu.com/283-1/
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=305214
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19929Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20002
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20073
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20076
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20223
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20241
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20253
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20333
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20424
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20457
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20625
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20762
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24479
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29847
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/839
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016016Patch
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1071
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1073
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1079
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:084
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006-06-02.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/25228
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0544.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/432734/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434164/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/17780
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0028
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1633
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0930
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1326/references
af854a3a-2127-422b-91ae-364da2661108http://www.wisec.it/vulns.php?page=8Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26228
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/283-1/
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.3
mysql mysql 4.1.8
mysql mysql 4.1.10
mysql mysql 4.1.12
mysql mysql 4.1.13
mysql mysql 4.1.14
mysql mysql 4.1.15
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.16
oracle mysql 4.0.17
oracle mysql 4.0.18
oracle mysql 4.0.19
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.23
oracle mysql 4.0.24
oracle mysql 4.0.25
oracle mysql 4.0.26
oracle mysql 4.1.0
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5
oracle mysql 4.1.6
oracle mysql 4.1.7
oracle mysql 4.1.9
oracle mysql 4.1.11
oracle mysql 4.1.16
oracle mysql 4.1.17
oracle mysql 4.1.18
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message."
    }
  ],
  "id": "CVE-2006-1517",
  "lastModified": "2024-11-21T00:09:04.820",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-05T12:46:00.000",
  "references": [
    {
      "source": "security@debian.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
    },
    {
      "source": "security@debian.org",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "security@debian.org",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "security@debian.org",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19929"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20002"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20073"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20076"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20223"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20241"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20253"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20333"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20424"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20457"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20625"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20762"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/29847"
    },
    {
      "source": "security@debian.org",
      "url": "http://securityreason.com/securityalert/839"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016016"
    },
    {
      "source": "security@debian.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377"
    },
    {
      "source": "security@debian.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.debian.org/security/2006/dsa-1071"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.debian.org/security/2006/dsa-1073"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.debian.org/security/2006/dsa-1079"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.osvdb.org/25228"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securityfocus.com/bid/17780"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.trustix.org/errata/2006/0028"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.vupen.com/english/advisories/2006/1633"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.vupen.com/english/advisories/2008/1326/references"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.wisec.it/vulns.php?page=8"
    },
    {
      "source": "security@debian.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26228"
    },
    {
      "source": "security@debian.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036"
    },
    {
      "source": "security@debian.org",
      "url": "https://usn.ubuntu.com/283-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19929"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20333"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20424"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20762"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/25228"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17780"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1633"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1326/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.wisec.it/vulns.php?page=8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26228"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/283-1/"
    }
  ],
  "sourceIdentifier": "security@debian.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:34
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0101.
References
secalert_us@oracle.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
secalert_us@oracle.comhttp://osvdb.org/78379
secalert_us@oracle.comhttp://secunia.com/advisories/48250
secalert_us@oracle.comhttp://secunia.com/advisories/53372
secalert_us@oracle.comhttp://security.gentoo.org/glsa/glsa-201308-06.xml
secalert_us@oracle.comhttp://www.debian.org/security/2012/dsa-2429
secalert_us@oracle.comhttp://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
secalert_us@oracle.comhttp://www.ubuntu.com/usn/USN-1397-1
secalert_us@oracle.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/72521
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/78379
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48250
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/53372
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201308-06.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2429
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/72521
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.45
mysql mysql 5.0.45b
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91
oracle mysql 5.0.92
oracle mysql 5.0.93
oracle mysql 5.0.94



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*",
              "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0101."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.0.x y v5.1.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a los CVEs:  CVE-2012-0087 y CVE-2012-0101."
    }
  ],
  "id": "CVE-2012-0102",
  "lastModified": "2024-11-21T01:34:23.590",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:06.037",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://osvdb.org/78379"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/78379"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-05-03 22:55
Modified
2024-11-21 01:35
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.60 and earlier, and 5.5.19 and earlier, allows remote authenticated users to affect availability, related to MyISAM.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql *
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.61
oracle mysql *
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E78D5A70-ADE3-4F81-A8EF-5379DB54434C",
              "versionEndIncluding": "5.1.60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A36F82C-6EBF-497B-9C20-AFB2007AA684",
              "versionEndIncluding": "5.5.19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.60 and earlier, and 5.5.19 and earlier, allows remote authenticated users to affect availability, related to MyISAM."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server en Oracle MySQL v5.1.60 y anteriores, y v5.5.19 y anteriores, que permite a usuarios remotos autenticados afectar la disponibilidad, relacionado con MyISAM."
    }
  ],
  "id": "CVE-2012-0583",
  "lastModified": "2024-11-21T01:35:18.953",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-05-03T22:55:02.123",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48890"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/49179"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securityfocus.com/bid/53061"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securitytracker.com/id?1026934"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48890"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53061"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026934"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-16 01:19
Modified
2024-11-21 00:31
Severity ?
Summary
MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=27515Vendor Advisory
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.htmlPatch, Vendor Advisory
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.mysql.com/announce/470Vendor Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.htmlThird Party Advisory
cve@mitre.orghttp://osvdb.org/34766Broken Link
cve@mitre.orghttp://secunia.com/advisories/25301Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/25946Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/26073Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/26430Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/27155Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/27823Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/28838Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/30351Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/31226Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/32222Third Party Advisory
cve@mitre.orghttp://support.apple.com/kb/HT3216Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1413Third Party Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:139Third Party Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0894.htmlThird Party Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0364.htmlThird Party Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0768.htmlThird Party Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/473874/100/0/threadedThird Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/24016Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/31681Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id?1018069Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1804Third Party Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2780Third Party Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/34347Third Party Advisory, VDB Entry
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1536Broken Link
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/528-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=27515Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/announce/470Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/34766Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25301Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25946Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26073Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26430Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27155Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27823Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28838Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30351Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31226Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32222Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3216Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1413Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:139Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0894.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0364.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0768.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/473874/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24016Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31681Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018069Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1804Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2780Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/34347Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1536Broken Link
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/528-1/Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBEF6DC-B3F3-4022-8EA8-954DC7190DCB",
              "versionEndIncluding": "4.1.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C0994F-0692-448D-A0FB-93C05760E5D5",
              "versionEndExcluding": "5.0.42",
              "versionStartIncluding": "5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5624BDD4-657E-4E27-8DE2-EA15028C21D6",
              "versionEndExcluding": "5.1.18",
              "versionStartIncluding": "5.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
              "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables."
    },
    {
      "lang": "es",
      "value": "MySQL anterior a 4.1.23, 5.0.x anterior a 5.0.42, y 5.1.x anterior a 5.1.18 no requiere el privilegio DROP para sentencias RENAME TABLE, lo cual permite a usuarios autenticados remotamente renombrar tablas de su elecci\u00f3n."
    }
  ],
  "evaluatorSolution": "The vendor has released a product update to address this issue:\r\nUpgrade to MySQL version 5.1.18: http://dev.mysql.com/downloads/",
  "id": "CVE-2007-2691",
  "lastModified": "2024-11-21T00:31:25.197",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-16T01:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=27515"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.mysql.com/announce/470"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/34766"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25301"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25946"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/26073"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/26430"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/27155"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/27823"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/28838"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31226"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/32222"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT3216"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2007/dsa-1413"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/24016"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/31681"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1018069"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/1804"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2780"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34347"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://issues.rpath.com/browse/RPL-1536"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/528-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=27515"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.mysql.com/announce/470"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/34766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25301"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25946"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/26073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/26430"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/27155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/27823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/28838"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/32222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT3216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2007/dsa-1413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/24016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/31681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1018069"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/1804"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2780"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34347"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://issues.rpath.com/browse/RPL-1536"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/528-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-2691\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n",
      "lastModified": "2007-05-29T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-11 20:00
Modified
2024-11-21 01:19
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing "alternate reads from two indexes on a table," which triggers an assertion failure.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=54007Exploit, Patch
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
cve@mitre.orghttp://secunia.com/advisories/42875Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42936Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2143
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:155
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:222
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:012
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2010/09/28/10Exploit, Patch
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0824.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0825.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/42633
cve@mitre.orghttp://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txtVendor Advisory
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0105Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0133Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0345Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=628680Exploit, Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64685
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=54007Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42875Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2143
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:155
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:222
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:012
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/28/10Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0824.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0825.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/42633
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0105Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0133Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0345Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=628680Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64685
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing \"alternate reads from two indexes on a table,\" which triggers an assertion failure."
    },
    {
      "lang": "es",
      "value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49 y versiones 5.5 anteriores a 5.5.5, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio mysqld) mediante la interfaz HANDLER y realizar \"alternate reads from two indexes on a table\", lo que desencadena un fallo de aserci\u00f3n."
    }
  ],
  "id": "CVE-2010-3681",
  "lastModified": "2024-11-21T01:19:22.833",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-11T20:00:01.557",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=54007"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/42633"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628680"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64685"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=54007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42633"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64685"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:35
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors.
References
secalert_us@oracle.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
secalert_us@oracle.comhttp://osvdb.org/78372
secalert_us@oracle.comhttp://secunia.com/advisories/48250
secalert_us@oracle.comhttp://secunia.com/advisories/53372
secalert_us@oracle.comhttp://security.gentoo.org/glsa/glsa-201308-06.xml
secalert_us@oracle.comhttp://www.debian.org/security/2012/dsa-2429
secalert_us@oracle.comhttp://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
secalert_us@oracle.comhttp://www.securityfocus.com/bid/51515
secalert_us@oracle.comhttp://www.ubuntu.com/usn/USN-1397-1
secalert_us@oracle.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/72525
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/78372
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48250
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/53372
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201308-06.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2429
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/51515
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/72525
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.45
mysql mysql 5.0.45b
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91
oracle mysql 5.0.92
oracle mysql 5.0.93
oracle mysql 5.0.94



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*",
              "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.0.x, v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la confidencialidad de los datos a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2012-0484",
  "lastModified": "2024-11-21T01:35:05.253",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:07.087",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://osvdb.org/78372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securityfocus.com/bid/51515"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72525"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/78372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51515"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72525"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-08-09 22:04
Modified
2024-11-21 00:14
Severity ?
Summary
MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=15195Exploit, Patch
cve@mitre.orghttp://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.htmlPatch
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.htmlPatch
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=305214
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
cve@mitre.orghttp://secunia.com/advisories/21259Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/21382
cve@mitre.orghttp://secunia.com/advisories/21627
cve@mitre.orghttp://secunia.com/advisories/21685
cve@mitre.orghttp://secunia.com/advisories/21770
cve@mitre.orghttp://secunia.com/advisories/22080
cve@mitre.orghttp://secunia.com/advisories/24479
cve@mitre.orghttp://secunia.com/advisories/30351
cve@mitre.orghttp://secunia.com/advisories/31226
cve@mitre.orghttp://securitytracker.com/id?1016617Patch
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:149
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_23_sr.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0083.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0364.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0768.html
cve@mitre.orghttp://www.securityfocus.com/bid/19279Patch
cve@mitre.orghttp://www.ubuntu.com/usn/usn-338-1
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3079
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/0930
cve@mitre.orghttps://issues.rpath.com/browse/RPL-568
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=15195Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=305214
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21259Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21382
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21627
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21685
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21770
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22080
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24479
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30351
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31226
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016617Patch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:149
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_23_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0083.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0364.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0768.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19279Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-338-1
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3079
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0930
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-568
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.2
mysql mysql 4.1.3
mysql mysql 4.1.8
mysql mysql 4.1.10
mysql mysql 4.1.12
mysql mysql 4.1.13
mysql mysql 4.1.14
mysql mysql 4.1.15
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
oracle mysql 3.22.27
oracle mysql 3.22.28
oracle mysql 3.22.29
oracle mysql 3.22.30
oracle mysql 3.22.32
oracle mysql 3.23
oracle mysql 3.23.0
oracle mysql 3.23.1
oracle mysql 3.23.2
oracle mysql 3.23.3
oracle mysql 3.23.4
oracle mysql 3.23.5
oracle mysql 3.23.6
oracle mysql 3.23.7
oracle mysql 3.23.8
oracle mysql 3.23.9
oracle mysql 3.23.10
oracle mysql 3.23.11
oracle mysql 3.23.12
oracle mysql 3.23.13
oracle mysql 3.23.14
oracle mysql 3.23.15
oracle mysql 3.23.16
oracle mysql 3.23.17
oracle mysql 3.23.18
oracle mysql 3.23.19
oracle mysql 3.23.20
oracle mysql 3.23.21
oracle mysql 3.23.22
oracle mysql 3.23.23
oracle mysql 3.23.24
oracle mysql 3.23.25
oracle mysql 3.23.26
oracle mysql 3.23.27
oracle mysql 3.23.28
oracle mysql 3.23.28
oracle mysql 3.23.29
oracle mysql 3.23.30
oracle mysql 3.23.31
oracle mysql 3.23.32
oracle mysql 3.23.33
oracle mysql 3.23.34
oracle mysql 3.23.35
oracle mysql 3.23.36
oracle mysql 3.23.37
oracle mysql 3.23.38
oracle mysql 3.23.39
oracle mysql 3.23.40
oracle mysql 3.23.41
oracle mysql 3.23.42
oracle mysql 3.23.43
oracle mysql 3.23.44
oracle mysql 3.23.45
oracle mysql 3.23.46
oracle mysql 3.23.47
oracle mysql 3.23.48
oracle mysql 3.23.49
oracle mysql 3.23.50
oracle mysql 3.23.51
oracle mysql 3.23.52
oracle mysql 3.23.53
oracle mysql 3.23.53a
oracle mysql 3.23.54
oracle mysql 3.23.54a
oracle mysql 3.23.55
oracle mysql 3.23.56
oracle mysql 3.23.57
oracle mysql 3.23.58
oracle mysql 3.23.59
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.16
oracle mysql 4.0.17
oracle mysql 4.0.18
oracle mysql 4.0.19
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.23
oracle mysql 4.0.24
oracle mysql 4.0.25
oracle mysql 4.0.26
oracle mysql 4.0.27
oracle mysql 4.1.0
oracle mysql 4.1.1
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5
oracle mysql 4.1.6
oracle mysql 4.1.7
oracle mysql 4.1.9
oracle mysql 4.1.11
oracle mysql 4.1.16
oracle mysql 4.1.17
oracle mysql 4.1.18
oracle mysql 4.1.19
oracle mysql 4.1.20
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "45AD5549-07DC-43DA-B277-D7BF16ABE4E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "787CB28C-74C6-4356-8AB3-4183CD941EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30459B9-0FAC-48DF-9601-AAD1A028846F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "86DC48D3-09F1-48BD-A783-0549D4D5E8B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "209E0C63-FC71-4E19-B3D5-BCB71A758252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DBBAC9-AA05-409F-82B2-A552A3417E45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "EA087258-8A5B-472E-B120-9B56415F8869",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "204CF85D-DFAD-4052-B24A-DCE09B32426E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B78C9D8-E6BC-4D80-8C29-219C1F151570",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A7DE48-60E6-42FE-8986-0DB1647C1BFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D5DFB7-1AA6-468D-A077-5BB4B32C92B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C786D54-7DEC-41B8-A778-BED9DA66C3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0F32D6-B2A9-4AC3-A4F9-E4A291AEC91A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1BD316B-5855-462D-B378-6AAF9817F23D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "38D864BB-32A6-44FC-870F-3663E53F2277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F5BA337-5845-4E3E-8DB5-AAB81A460376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BC06D07-8C16-48D4-A95E-8F40CFAE6514",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B9CEC-580F-4143-B111-032195BCC760",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F41E62F-A606-4842-985C-2B349C405E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.20:beta:*:*:*:*:*:*",
              "matchCriteriaId": "9EF1E839-E1C9-4A13-A6BA-6F8C56FDF148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "692E4E06-D559-4735-AED5-CE9E572CF608",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "77B463E6-DAD6-4013-8095-F0153F8B335F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EFB2D10-E255-4DD3-BF03-217803CDED24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A46F3F-7A97-4AE5-885B-15E25BC575C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "37512B4B-C428-4D30-AAF3-9557C7257967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B1527A-5039-470B-87DC-B02F557364A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy."
    },
    {
      "lang": "es",
      "value": "MySQL 4.1 anterior a 4.1.21 y 5.0 anterior a 5.0.24 permite a usuarios locales acceder a una tabla a trav\u00e9s de una tabla MERGE previamente creada, incluso despu\u00e9s de que los privilegios del usuario han sido revocados para la tabla original, lo cual podr\u00eda violar la pol\u00edtica de seguridad pretendida."
    }
  ],
  "evaluatorSolution": "This vulnerability is addressed in the following product releases:\r\nMySQL, MySQL, 4.1.21 \r\nMySQL, MySQL, 5.0.24",
  "id": "CVE-2006-4031",
  "lastModified": "2024-11-21T00:14:58.740",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-09T22:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=15195"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21259"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21382"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21627"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21685"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21770"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22080"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31226"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016617"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19279"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-338-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3079"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-568"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=15195"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21259"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21382"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21685"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016617"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19279"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-338-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-568"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "This issue was corrected in all affected mysql packages versions as shipped in Red Hat Enterprise Linux or Red Hat Application Stack via:\n\nhttps://rhn.redhat.com/errata/CVE-2006-4031.html\n\nThis issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1 or 3",
      "lastModified": "2008-07-25T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-14 19:02
Modified
2024-11-21 01:19
Severity ?
Summary
MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=54476Patch
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
cve@mitre.orghttp://secunia.com/advisories/42875Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42936
cve@mitre.orghttp://support.apple.com/kb/HT4723
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2143
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:222
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:223
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0825.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/43676
cve@mitre.orghttp://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0105
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0345
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=640856Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64841
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=54476Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42875Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4723
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2143
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:222
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:223
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0825.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/43676
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0105
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0345
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=640856Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64841
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.45b
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.27
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object."
    },
    {
      "lang": "es",
      "value": "MySQL v5.0 antes de v5.0.92, v5.1 antes de v5.1.51, y v5.5 antes de v5.5.6 permiten a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (por ca\u00edda del servidor) a trav\u00e9s de una declaraci\u00f3n preparada que utiliza GROUP_CONCAT con el modificador WITH ROLLUP, probablemente provocando un error de uso despu\u00e9s de liberaci\u00f3n un objeto copiado es modificado, de tal manera que tambi\u00e9n afecta al objeto original."
    }
  ],
  "id": "CVE-2010-3837",
  "lastModified": "2024-11-21T01:19:43.367",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-14T19:02:43.437",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=54476"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640856"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64841"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=54476"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640856"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64841"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:34
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102.
References
secalert_us@oracle.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
secalert_us@oracle.comhttp://osvdb.org/78377
secalert_us@oracle.comhttp://secunia.com/advisories/48250
secalert_us@oracle.comhttp://secunia.com/advisories/53372
secalert_us@oracle.comhttp://security.gentoo.org/glsa/glsa-201308-06.xml
secalert_us@oracle.comhttp://www.debian.org/security/2012/dsa-2429
secalert_us@oracle.comhttp://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
secalert_us@oracle.comhttp://www.securityfocus.com/bid/51509
secalert_us@oracle.comhttp://www.ubuntu.com/usn/USN-1397-1
secalert_us@oracle.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/72519
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/78377
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48250
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/53372
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201308-06.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2429
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/51509
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/72519
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.45
mysql mysql 5.0.45b
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91
oracle mysql 5.0.92
oracle mysql 5.0.93
oracle mysql 5.0.94



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*",
              "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.0.x y v5.1.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a la de los CVEs: CVE-2012-0101 y CVE-2012-0102."
    }
  ],
  "id": "CVE-2012-0087",
  "lastModified": "2024-11-21T01:34:21.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:05.273",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://osvdb.org/78377"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securityfocus.com/bid/51509"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72519"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/78377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51509"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72519"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-06 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string.
Impacted products
Vendor Product Version
mysql mysql 4.1.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n check_scramble_323 de MySQL 4.1x anteriores a 4.1.4, y 5.0, permite a atacantes remotos saltarse la autenticaci\u00f3n mediente una cadena revuelta de longitud cero."
    }
  ],
  "id": "CVE-2004-0627",
  "lastModified": "2024-11-20T23:49:00.883",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-06T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/184030"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/184030"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-08-16 04:00
Modified
2024-11-20 23:59
Severity ?
Summary
Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt
cve@mitre.orghttp://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.htmlPatch, Vendor Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=112354450412427&w=2
cve@mitre.orghttp://secunia.com/advisories/17027
cve@mitre.orghttp://secunia.com/advisories/20381
cve@mitre.orghttp://secunia.com/advisories/29847
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
cve@mitre.orghttp://www.appsecinc.com/resources/alerts/mysql/2005-002.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2005/dsa-829
cve@mitre.orghttp://www.debian.org/security/2005/dsa-831
cve@mitre.orghttp://www.debian.org/security/2005/dsa-833
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:163
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_21_sr.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html
cve@mitre.orghttp://www.securityfocus.com/bid/14509Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/1326/references
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/21737
cve@mitre.orghttps://www.ubuntu.com/usn/usn-180-1/
cve@mitre.orghttps://www.ubuntu.com/usn/usn-180-2/
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=112354450412427&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17027
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20381
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29847
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
af854a3a-2127-422b-91ae-364da2661108http://www.appsecinc.com/resources/alerts/mysql/2005-002.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-829
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-831
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-833
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:163
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_21_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/14509Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1326/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/21737
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/usn-180-1/
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/usn-180-2/
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.3
mysql mysql 4.1.10
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.18
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.24
oracle mysql 4.1.0
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5
oracle mysql 5.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field."
    }
  ],
  "id": "CVE-2005-2558",
  "lastModified": "2024-11-20T23:59:50.070",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-16T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112354450412427\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17027"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20381"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29847"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-002.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-829"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-831"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-833"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:163"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2005_21_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/14509"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/1326/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21737"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.ubuntu.com/usn/usn-180-1/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.ubuntu.com/usn/usn-180-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112354450412427\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20381"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-829"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-831"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:163"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_21_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/14509"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1326/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21737"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.ubuntu.com/usn/usn-180-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.ubuntu.com/usn/usn-180-2/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-11-30 17:30
Modified
2024-11-21 01:08
Severity ?
Summary
The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.
References
secalert@redhat.comhttp://bugs.mysql.com/47320
secalert@redhat.comhttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html
secalert@redhat.comhttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html
secalert@redhat.comhttp://lists.mysql.com/commits/87446Exploit
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
secalert@redhat.comhttp://marc.info/?l=oss-security&m=125881733826437&w=2
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/11/19/3
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/11/23/16
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0109.html
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1107Vendor Advisory
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/47320
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/commits/87446Exploit
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=125881733826437&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/19/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/23/16
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0109.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1107Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510
Impacted products
Vendor Product Version
mysql mysql *
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.27
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "749E313A-CD07-40DA-97D6-58F53D62231B",
              "versionEndIncluding": "5.0.87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n vio_verify_callback en vio_verify_callback de MySQL v5.0.x anteriores a v5.0.88 y v5.1.x anteriores a v5.1.41, cuando utiliza OpenSSL, acepta un valor cero para la profundidad de los certificados X.509, permitiendo a atacantes de hombre en medio (man-in-the-middle) suplantar servidores MySQL de su elecci\u00f3n basados en SSL mediante un certificado creado espec\u00edficamente, como se ha demostrado por un certificado presentado por un servidor vinculado con la biblioteca yaSSL."
    }
  ],
  "id": "CVE-2009-4028",
  "lastModified": "2024-11-21T01:08:46.520",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-11-30T17:30:00.327",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.mysql.com/47320"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://lists.mysql.com/commits/87446"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/23/16"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1107"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/47320"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://lists.mysql.com/commits/87446"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/23/16"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-11 20:00
Modified
2024-11-21 01:19
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via certain arguments to the BINLOG command, which triggers an access of uninitialized memory, as demonstrated by valgrind.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=54393Patch
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
cve@mitre.orghttp://secunia.com/advisories/42936Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:155
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:012
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2010/09/28/10Exploit, Patch
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/42638
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0133Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=628062Exploit, Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64687
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=54393Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:155
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:012
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/28/10Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/42638
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0133Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=628062Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64687
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via certain arguments to the BINLOG command, which triggers an access of uninitialized memory, as demonstrated by valgrind."
    },
    {
      "lang": "es",
      "value": "Oracle MySQL 5.1 ersiones anteriores a la 5.1.49 permite a los usuarios autenticados remotos provocar una denegaci\u00f3n de servicio (bloqueo del demonio mysqld) a trav\u00e9s de ciertos argumentos al comando BINLOG, que desencadena un acceso a la memoria no inicializada, como lo demuestra valgrind."
    }
  ],
  "id": "CVE-2010-3679",
  "lastModified": "2024-11-21T01:19:22.480",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-11T20:00:01.447",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=54393"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/42638"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628062"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=54393"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42638"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628062"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64687"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:34
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a las de los CVEs: CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485 y CVE-2012-0492."
    }
  ],
  "id": "CVE-2012-0119",
  "lastModified": "2024-11-21T01:34:25.570",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:06.947",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:34
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a las de los siguientes CVEs: CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485 y CVE-2012-0492."
    }
  ],
  "id": "CVE-2012-0112",
  "lastModified": "2024-11-21T01:34:24.700",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:06.447",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-05-05 12:46
Modified
2024-11-21 00:09
Severity ?
Summary
Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values.
References
security@debian.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939Patch
security@debian.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.htmlPatch
security@debian.orghttp://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
security@debian.orghttp://secunia.com/advisories/19929Patch, Vendor Advisory
security@debian.orghttp://secunia.com/advisories/20241
security@debian.orghttp://secunia.com/advisories/20253
security@debian.orghttp://secunia.com/advisories/20333
security@debian.orghttp://secunia.com/advisories/20457
security@debian.orghttp://secunia.com/advisories/20762
security@debian.orghttp://securityreason.com/securityalert/839
security@debian.orghttp://securitytracker.com/id?1016016Patch
security@debian.orghttp://www.debian.org/security/2006/dsa-1071
security@debian.orghttp://www.debian.org/security/2006/dsa-1073
security@debian.orghttp://www.debian.org/security/2006/dsa-1079
security@debian.orghttp://www.kb.cert.org/vuls/id/602457Patch, Third Party Advisory, US Government Resource
security@debian.orghttp://www.novell.com/linux/security/advisories/2006-06-02.html
security@debian.orghttp://www.securityfocus.com/archive/1/432734/100/0/threaded
security@debian.orghttp://www.securityfocus.com/bid/17780
security@debian.orghttp://www.vupen.com/english/advisories/2006/1633
security@debian.orghttp://www.wisec.it/vulns.php?page=8Patch
security@debian.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26232
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19929Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20241
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20253
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20333
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20457
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20762
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/839
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016016Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1071
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1073
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1079
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/602457Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006-06-02.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/432734/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/17780
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1633
af854a3a-2127-422b-91ae-364da2661108http://www.wisec.it/vulns.php?page=8Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26232
Impacted products
Vendor Product Version
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values."
    }
  ],
  "id": "CVE-2006-1518",
  "lastModified": "2024-11-21T00:09:04.987",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-05T12:46:00.000",
  "references": [
    {
      "source": "security@debian.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
    },
    {
      "source": "security@debian.org",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19929"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20241"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20253"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20333"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20457"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20762"
    },
    {
      "source": "security@debian.org",
      "url": "http://securityreason.com/securityalert/839"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016016"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.debian.org/security/2006/dsa-1071"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.debian.org/security/2006/dsa-1073"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.debian.org/security/2006/dsa-1079"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/602457"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securityfocus.com/bid/17780"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.vupen.com/english/advisories/2006/1633"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.wisec.it/vulns.php?page=8"
    },
    {
      "source": "security@debian.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19929"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20333"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20762"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/602457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17780"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1633"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.wisec.it/vulns.php?page=8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26232"
    }
  ],
  "sourceIdentifier": "security@debian.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-11 20:00
Modified
2024-11-21 01:19
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted "SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=52711Exploit, Patch
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
cve@mitre.orghttp://secunia.com/advisories/42875Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42936Vendor Advisory
cve@mitre.orghttp://support.apple.com/kb/HT4723
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2143
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:155
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:222
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:012
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2010/09/28/10Exploit, Patch
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0825.htmlVendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/42599
cve@mitre.orghttp://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0105Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0133Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0345Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=628328Exploit, Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64684
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=52711Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42875Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4723
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2143
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:155
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:222
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:012
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/28/10Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0825.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/42599
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0105Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0133Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0345Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=628328Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64684
Impacted products
Vendor Product Version
mysql mysql *
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
mysql mysql *
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.72
mysql mysql 5.0.74
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.28
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.34
oracle mysql 5.0.36
oracle mysql 5.0.38
oracle mysql 5.0.40
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.44
oracle mysql 5.0.45
oracle mysql 5.0.46
oracle mysql 5.0.48
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.56
oracle mysql 5.0.58
oracle mysql 5.0.62
oracle mysql 5.0.64
oracle mysql 5.0.66
oracle mysql 5.0.66
oracle mysql 5.0.67
oracle mysql 5.0.68
oracle mysql 5.0.70
oracle mysql 5.0.72
oracle mysql 5.0.74
oracle mysql 5.0.75
oracle mysql 5.0.76
oracle mysql 5.0.77
oracle mysql 5.0.78
oracle mysql 5.0.79
oracle mysql 5.0.80
oracle mysql 5.0.81
oracle mysql 5.0.82
oracle mysql 5.0.83
oracle mysql 5.0.84
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.87
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3983147C-7775-4FBC-85B1-E33DB1EDD669",
              "versionEndIncluding": "5.1.48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1092CB84-5263-49AF-A9E3-D36FA2A699A3",
              "versionEndIncluding": "5.0.91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE3D740-E7E8-4E4E-BA75-899015500396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "6421D8E6-6769-400E-A7EA-DA683F637F49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB92A552-079E-4A5E-B65E-8A6C956FC7DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5CD839-1C18-44F2-836F-97B85572D491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "4BA355E8-593E-470C-B565-60CD51B14C3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF30535-45D3-4845-8B7C-16F7B6D05F63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "87BAAF59-A8F5-46AB-9CAC-E0F76B47D942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "60540719-8329-47E4-820F-8B4E4AA55AF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "7147148B-BD26-4280-9B3F-1B27551E0CAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:a:*:*:*:*:*:*",
              "matchCriteriaId": "533421DF-D468-4E83-B27D-612778735F8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:b:*:*:*:*:*:*",
              "matchCriteriaId": "1F307DFE-D497-4494-91FF-B056E70C71A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "B15A96B9-3982-49DF-A836-1DBC3FD29EF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "A02DEBB1-65A5-4422-8B75-E8C86EA0B947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB11E34-4045-4ACA-AD7D-48B70D13CD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D2FC440-4D06-4CE2-BE20-A46EB196182F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.66:a:*:*:*:*:*:*",
              "matchCriteriaId": "FFF392C0-4042-4E91-890F-71C0C05AAB56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "455E364E-5010-47D9-8F09-58FE4B15615B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "8462FC32-D6C8-448C-992F-F13C63D163BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B91B6CB-624D-429C-86CD-28CBA1A8AD0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.72:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "E1DFB3DB-FBD9-4542-82B9-C7EA603135EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.74:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "7A77E76D-1CE4-446C-9F2D-18913BE0F4B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01C656F-C7CE-4625-9C7C-A160291E327F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AB3A560-CAC3-4173-BA24-A00E85A10C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9F17925-3F60-4DA8-86D6-596AC8A7466D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF9B3CCC-7FE4-48FA-8DC6-F508999E9406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.82:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "18F1CDDF-D1ED-4A9A-A34F-757C2B8FD4EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.84:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "0E20D59E-D30F-4FCD-B3E7-69BA102E434A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.87:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "DA8DC8BB-6339-4FF7-A334-DE0DDE3FB3B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function."
    },
    {
      "lang": "es",
      "value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49 y versiones 5.0 anteriores a 5.0.92, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio mysqld) mediante el uso de EXPLAIN con declaraciones especialmente dise\u00f1adas \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\", que desencadena una desreferencia de puntero NULL en la funci\u00f3n Item_singlerow_subselect::store."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n\u0027CWE-476: NULL Pointer Dereference\u0027",
  "id": "CVE-2010-3682",
  "lastModified": "2024-11-21T01:19:23.007",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-11T20:00:01.603",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=52711"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/42599"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628328"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=52711"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42599"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628328"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-11 20:00
Modified
2024-11-21 01:19
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=52512Exploit, Patch
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
cve@mitre.orghttp://secunia.com/advisories/42936Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:155
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:012
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2010/09/28/10Exploit, Patch
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/42625
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0133Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=628698Exploit, Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64683
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=52512Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:155
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:012
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/28/10Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/42625
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0133Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=628698Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64683
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request."
    },
    {
      "lang": "es",
      "value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49 y versiones 5.5 anteriores a 5.5.5, env\u00eda un paquete OK cuando una petici\u00f3n LOAD DATA INFILE genera errores SQL, lo que permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio mysqld) por medio de una petici\u00f3n especialmente dise\u00f1ada."
    }
  ],
  "id": "CVE-2010-3683",
  "lastModified": "2024-11-21T01:19:23.187",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-11T20:00:01.650",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=52512"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/42625"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628698"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64683"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=52512"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628698"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64683"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:34
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors.
References
secalert_us@oracle.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
secalert_us@oracle.comhttp://osvdb.org/78374
secalert_us@oracle.comhttp://secunia.com/advisories/48250
secalert_us@oracle.comhttp://secunia.com/advisories/53372
secalert_us@oracle.comhttp://security.gentoo.org/glsa/glsa-201308-06.xml
secalert_us@oracle.comhttp://www.debian.org/security/2012/dsa-2429
secalert_us@oracle.comhttp://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
secalert_us@oracle.comhttp://www.securityfocus.com/bid/51526
secalert_us@oracle.comhttp://www.ubuntu.com/usn/USN-1397-1
secalert_us@oracle.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/72539
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/78374
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48250
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/53372
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201308-06.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2429
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/51526
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/72539
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.45
mysql mysql 5.0.45b
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91
oracle mysql 5.0.92
oracle mysql 5.0.93
oracle mysql 5.0.94



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*",
              "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.0.x, v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la integridad de los datos a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2012-0075",
  "lastModified": "2024-11-21T01:34:20.470",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "MULTIPLE",
          "availabilityImpact": "NONE",
          "baseScore": 1.7,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:M/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.2,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:04.490",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://osvdb.org/78374"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securityfocus.com/bid/51526"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72539"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/78374"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51526"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72539"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-07-10 21:05
Modified
2024-11-21 00:13
Severity ?
Summary
Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called. NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon. Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability
Impacted products
Vendor Product Version
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.1.5
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called.  NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon.  Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability"
    },
    {
      "lang": "es",
      "value": "** IMPUGNADA ** Desbordamiento de b\u00fafer por superaci\u00f3n del l\u00edmite en la funci\u00f3n Instance_options::complete_initialization de instance_options.cc en el Instance Manager de MySQL antes de 5.0.23 y 5.1 antes de 5.1.12 podr\u00eda permitir a usuarios locales provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) mediante vectores sin especificar, lo que dispara el desbordamiento cuando se llama a la funci\u00f3n convert_dirname. NOTA: el fabricante ha impugnado este problema por email a CVE, diciendo que solamente es explotable cuando el usuario tiene acceso al archivo de configuraci\u00f3n o al demonio Instance Manager. Debido a su funcionalidad prevista, este nivel de acceso ya permitir\u00eda al usuario interrumpir la operaci\u00f3n del programa, por lo cual esto no transpasa los l\u00edmites de seguridad y no es una vulnerabilidad."
    }
  ],
  "id": "CVE-2006-3486",
  "lastModified": "2024-11-21T00:13:43.533",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-07-10T21:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=20622"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/2700"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27635"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=20622"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/2700"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27635"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "We do not consider this issue to have security implications, and therefore have no plans to issue MySQL updates for Red Hat Enterprise Linux 2.1, 3, or 4 to correct this issue.",
      "lastModified": "2006-07-19T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-06-08 00:30
Modified
2024-11-21 01:15
Severity ?
Summary
Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=53371
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
cve@mitre.orghttp://lists.mysql.com/commits/107532
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
cve@mitre.orghttp://securitytracker.com/id?1024031
cve@mitre.orghttp://support.apple.com/kb/HT4435
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:107
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0442.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0824.html
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=53371
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/commits/107532
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1024031
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4435
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:107
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0442.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0824.html
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210
Impacted products
Vendor Product Version
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.24
mysql mysql 5.0.45b
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.27
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.41
oracle mysql 5.0.45
oracle mysql 5.0.51
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.30
oracle mysql 5.1.33
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en MySQL v5.0 hasta v5.0.91 y v5.1 anteriores a v5.1.47 permite a usuarios autenticados remotamente saltarse tablas establecidas permitiendo leer definiciones de campos de tablas de su elecci\u00f3n, y sobre v5.1 leer o eliminar contenido de tablas de su elecci\u00f3n, a trav\u00e9s de .. (punto punto) en un nombre de tabla."
    }
  ],
  "id": "CVE-2010-1848",
  "lastModified": "2024-11-21T01:15:18.690",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-06-08T00:30:01.630",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=53371"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.mysql.com/commits/107532"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1024031"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4435"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=53371"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.mysql.com/commits/107532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1024031"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4435"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-06-01 17:02
Modified
2024-11-21 00:11
Severity ?
Summary
SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input.
References
secalert@redhat.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735
secalert@redhat.comhttp://docs.info.apple.com/article.html?artnum=305214
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
secalert@redhat.comhttp://lists.mysql.com/announce/364Patch
secalert@redhat.comhttp://secunia.com/advisories/20365
secalert@redhat.comhttp://secunia.com/advisories/20489
secalert@redhat.comhttp://secunia.com/advisories/20531
secalert@redhat.comhttp://secunia.com/advisories/20541
secalert@redhat.comhttp://secunia.com/advisories/20562
secalert@redhat.comhttp://secunia.com/advisories/20625
secalert@redhat.comhttp://secunia.com/advisories/20712
secalert@redhat.comhttp://secunia.com/advisories/24479
secalert@redhat.comhttp://securitytracker.com/id?1016216
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-1092
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200606-13.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:097
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0544.html
secalert@redhat.comhttp://www.securityfocus.com/bid/18219
secalert@redhat.comhttp://www.trustix.org/errata/2006/0034/
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-288-3
secalert@redhat.comhttp://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/2105
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/0930
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/26875
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10312
secalert@redhat.comhttps://usn.ubuntu.com/303-1/
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=305214
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/announce/364Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20365
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20489
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20531
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20541
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20562
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20625
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20712
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24479
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016216
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1092
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200606-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:097
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0544.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/18219
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0034/
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-288-3
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2105
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0930
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26875
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10312
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/303-1/
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.2
mysql mysql 4.1.3
mysql mysql 4.1.8
mysql mysql 4.1.10
mysql mysql 4.1.12
mysql mysql 4.1.13
mysql mysql 4.1.14
mysql mysql 4.1.15
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
oracle mysql 4.1.1
oracle mysql 4.1.4
oracle mysql 4.1.5
oracle mysql 4.1.6
oracle mysql 4.1.7
oracle mysql 4.1.9
oracle mysql 4.1.11
oracle mysql 4.1.16
oracle mysql 4.1.17
oracle mysql 4.1.18
oracle mysql 4.1.19
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input."
    }
  ],
  "id": "CVE-2006-2753",
  "lastModified": "2024-11-21T00:11:59.670",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-06-01T17:02:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.mysql.com/announce/364"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20365"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20489"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20531"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20541"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20562"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20625"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20712"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1016216"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2006/dsa-1092"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-13.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:097"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/18219"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.trustix.org/errata/2006/0034/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-288-3"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2006/2105"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26875"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10312"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://usn.ubuntu.com/303-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.mysql.com/announce/364"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20365"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20489"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20531"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20541"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20562"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20712"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1092"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:097"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/18219"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0034/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-288-3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10312"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/303-1/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:27
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote attackers to affect availability via unknown vectors.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.1.62
oracle mysql 5.1.63
oracle mysql 5.1.64
oracle mysql 5.1.65
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21
oracle mysql 5.5.22
oracle mysql 5.5.23
oracle mysql 5.5.24
oracle mysql 5.5.25
oracle mysql 5.5.25
oracle mysql 5.5.26
oracle mysql 5.5.27
oracle mysql 5.5.28



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF9060C-9469-48DA-858A-BB42E77AF88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E268D9E-0C18-4257-8820-634B7357BEE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "0942892C-2106-4F1F-AEBE-78C1CF55E363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE6C87CE-8BA5-4701-B295-7672AF52E6B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "54047553-C08F-474C-8650-89AAAC68056B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "41EE02F4-02F7-49A3-AFCA-C20BA2AF65C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "97045EB4-F22C-4694-BFB2-C1EA72705206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "88DC6246-988E-4259-8BAF-4F104ED12936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:*",
              "matchCriteriaId": "C34D221E-E9D9-4A1D-B3BC-CB66456D004B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF95406-DAA6-4164-95CE-F88F19C8DE24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "65EF36A4-EC77-46FA-B9E9-24B8DBC71BE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D9F2E70-A2F5-432F-A04C-B5811C1A23E8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote attackers to affect availability via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a atacantes remotos afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2011-2262",
  "lastModified": "2024-11-21T01:27:54.677",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:02.977",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-12-21 05:46
Modified
2024-11-21 01:35
Severity ?
Summary
Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other versions including 5.5.x before 5.5.22 and 5.1.x before 5.1.62, allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VulnDisco Pack Professional 9.17. NOTE: as of 20120224, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. NOTE: due to lack of details, it is not clear whether this issue is a duplicate of CVE-2012-0492 or another CVE.
Impacted products
Vendor Product Version
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other versions including 5.5.x before 5.5.22 and 5.1.x before 5.1.62, allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VulnDisco Pack Professional 9.17.  NOTE: as of 20120224, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.  NOTE: due to lack of details, it is not clear whether this issue is a duplicate of CVE-2012-0492 or another CVE."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en yaSSL, como se usa en MySQL v5.5.20 y posiblemente otras versiones incluidas v5.5.x antes de v5.5.22 y y 5.1.x antes de v5.1.62, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, seg\u00fan lo demostrado por VulnDisco Paquete Profesional v9.17. NOTA: a partir de 20120224, esta revelaci\u00f3n no tiene informaci\u00f3n procesable. Sin embargo, debido a que el autor del m\u00f3dulo es un investigador confiable, se ha asignado un identificador CVE al tema con fines de seguimiento. NOTA: debido a la falta de informaci\u00f3n, no est\u00e1 claro si este tema es un duplicado de CVE-2012-0492 CVE u otro."
    }
  ],
  "id": "CVE-2012-0882",
  "lastModified": "2024-11-21T01:35:54.290",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-12-21T05:46:15.120",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/02/24/2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0882buffer_overflow_vulnerability"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789141"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000011.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/02/24/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0882buffer_overflow_vulnerability"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789141"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000014.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-08-18 20:04
Modified
2024-11-21 00:15
Severity ?
Summary
MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=17647Exploit, Patch
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.htmlPatch
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=305214
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
cve@mitre.orghttp://lists.mysql.com/commits/5927Patch
cve@mitre.orghttp://secunia.com/advisories/21506Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/21627
cve@mitre.orghttp://secunia.com/advisories/21762
cve@mitre.orghttp://secunia.com/advisories/22080
cve@mitre.orghttp://secunia.com/advisories/24479
cve@mitre.orghttp://secunia.com/advisories/24744
cve@mitre.orghttp://securitytracker.com/id?1016710
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1169
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:149
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_23_sr.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0083.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0152.html
cve@mitre.orghttp://www.securityfocus.com/bid/19559Exploit, Patch
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3306
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/0930
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28448
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=17647Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=305214
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/commits/5927Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21506Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21627
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21762
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22080
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24479
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24744
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016710
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1169
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:149
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_23_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0083.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0152.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19559Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3306
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0930
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28448
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.2
mysql mysql 4.1.3
mysql mysql 4.1.8
mysql mysql 4.1.10
mysql mysql 4.1.12
mysql mysql 4.1.13
mysql mysql 4.1.14
mysql mysql 4.1.15
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.1.5
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.16
oracle mysql 4.0.17
oracle mysql 4.0.18
oracle mysql 4.0.19
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.23
oracle mysql 4.0.24
oracle mysql 4.0.25
oracle mysql 4.0.26
oracle mysql 4.0.27
oracle mysql 4.1.0
oracle mysql 4.1.1
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5
oracle mysql 4.1.6
oracle mysql 4.1.7
oracle mysql 4.1.9
oracle mysql 4.1.11
oracle mysql 4.1.16
oracle mysql 4.1.17
oracle mysql 4.1.18
oracle mysql 4.1.19
oracle mysql 4.1.20
oracle mysql 4.1.21
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8105AE3-7FF6-43C5-9B47-29ACD4DD7C3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions."
    },
    {
      "lang": "es",
      "value": "MySQL anteriores a 4.1.21, 5.0 anterior a 5.0.25, y 5.1 anteriores a 5.1.12, cuando se ejecutan en sistemas de fichero sensibles al uso de may\u00fasculas o min\u00fascular, permite a usuarios autenticados remotamente crear o acceder a una base de datos cuando el nombre de la base de datos difiere s\u00f3lo en el uso de may\u00fasculas y min\u00fasculas de una base de datos para la cual tienen permisos."
    }
  ],
  "evaluatorSolution": "Successful exploitation requires that MySQL runs on a system with a file system supporting case-sensitive file names.\r\nThis vulnerability is addresses in the following product releases: \r\nMySQL, MySQL, 4.1.21\r\nMySQL, MySQL, 5.0.25\r\nMySQL, MySQL, 5.1.12",
  "id": "CVE-2006-4226",
  "lastModified": "2024-11-21T00:15:26.157",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-18T20:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=17647"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.mysql.com/commits/5927"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21506"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21627"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21762"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22080"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24744"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016710"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1169"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19559"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=17647"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.mysql.com/commits/5927"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21506"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21762"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24744"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016710"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19559"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203426\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n\nThis issue does not affect Red Hat Enterprise Linux 2.1 or 3",
      "lastModified": "2006-09-19T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-10-27 21:29
Modified
2024-11-21 03:15
Summary
The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link.
References
Impacted products
Vendor Product Version
mariadb mariadb *
mysql mysql *
gentoo linux -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mariadb:mariadb:*:r1:*:*:*:*:*:*",
              "matchCriteriaId": "1666B9B6-FF52-479D-85D3-8750BDF4387A",
              "versionEndExcluding": "10.0.30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:r1:*:*:*:*:*:*",
              "matchCriteriaId": "AFB191C0-7262-43E1-A28A-102EA7DAD55B",
              "versionEndExcluding": "5.6.36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gentoo:linux:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92121D8A-529E-454A-BC8D-B6E0017E615D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link."
    },
    {
      "lang": "es",
      "value": "Los scripts de instalaci\u00f3n en los paquetes dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster y dev-db/mariadb-galera de Gento en versiones anteriores a 2017-09-29 tiene llamadas chown para \u00e1rboles de directorios modificables por los usuarios, lo que puede permitir que los usuarios locales obtengan privilegios aprovechando el acceso a la cuenta mysql para la creaci\u00f3n de un enlace."
    }
  ],
  "id": "CVE-2017-15945",
  "lastModified": "2024-11-21T03:15:30.547",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-10-27T21:29:00.310",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugs.gentoo.org/630822"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201711-04"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugs.gentoo.org/630822"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201711-04"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-05-14 19:30
Modified
2024-11-21 01:14
Severity ?
Summary
The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command.
Impacted products
Vendor Product Version
mysql mysql *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4BB16B9-9AE0-4A7A-B284-80F81D941462",
              "versionEndIncluding": "5.1.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n mysql_uninstall_plugin en sql/sql_plugin.cc en MySQL en versiones anteriores a la 5.1.46 no comprueba los privilegios antes de desinstalar un plugin, lo que puede permitir a atacantes remotos desinstalar plugins de su elecci\u00f3n mediante el  comando UNINSTALL PLUGIN."
    }
  ],
  "id": "CVE-2010-1621",
  "lastModified": "2024-11-21T01:14:49.680",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-05-14T19:30:01.453",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.mysql.com/bug.php?id=51770"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/39543"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=51770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/39543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-05-21 17:30
Modified
2024-11-21 01:14
Severity ?
Summary
MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.
References
secalert@redhat.comhttp://bugs.mysql.com/bug.php?id=40980Patch
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
secalert@redhat.comhttp://securitytracker.com/id?1024004
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:101
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/05/10/2
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/05/18/4
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0442.html
secalert@redhat.comhttp://www.securityfocus.com/bid/40257
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1397-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1194Vendor Advisory
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=40980Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1024004
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:101
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/05/10/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/05/18/4
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0442.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/40257
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1194Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490
Impacted products
Vendor Product Version
mysql mysql *
mysql mysql 5.0.5.0.21
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.24
mysql mysql 5.0.45b
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.27
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.41
oracle mysql 5.0.45
oracle mysql 5.0.51
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91
oracle mysql 5.1.30
oracle mysql 5.1.33
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.44



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4BB16B9-9AE0-4A7A-B284-80F81D941462",
              "versionEndIncluding": "5.1.45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL before 5.1.46 allows local users to delete the data and index files of another user\u0027s MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247."
    },
    {
      "lang": "es",
      "value": "MySQL en versiones anteriores a la v5.1.46 permite a los usuarios locales borrar los datos e \u00edndices de ficheros de tablas MyISAM de otros usuarios a trav\u00e9s de un  ataque de enlace simb\u00f3lico junto con un comando DROP TABLE, una vulnerabilidad diferente a la CVE-2008-4098 y CVE-2008-7247."
    }
  ],
  "id": "CVE-2010-1626",
  "lastModified": "2024-11-21T01:14:50.363",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-05-21T17:30:01.490",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=40980"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1024004"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2010/05/10/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2010/05/18/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/40257"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1194"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=40980"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1024004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/05/10/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/05/18/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/40257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1194"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        },
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:35
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0492.
References
secalert_us@oracle.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
secalert_us@oracle.comhttp://osvdb.org/78383
secalert_us@oracle.comhttp://secunia.com/advisories/48250
secalert_us@oracle.comhttp://secunia.com/advisories/53372
secalert_us@oracle.comhttp://security.gentoo.org/glsa/glsa-201308-06.xml
secalert_us@oracle.comhttp://www.debian.org/security/2012/dsa-2429
secalert_us@oracle.comhttp://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
secalert_us@oracle.comhttp://www.securityfocus.com/bid/51513
secalert_us@oracle.comhttp://www.ubuntu.com/usn/USN-1397-1
secalert_us@oracle.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/72526
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/78383
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48250
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/53372
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201308-06.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2429
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/51513
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/72526
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0492."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a las de los CVEs: CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120 y CVE-2012-0492."
    }
  ],
  "id": "CVE-2012-0485",
  "lastModified": "2024-11-21T01:35:05.420",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:07.133",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://osvdb.org/78383"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securityfocus.com/bid/51513"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72526"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/78383"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51513"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72526"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-14 19:02
Modified
2024-11-21 01:19
Severity ?
Summary
MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=55564
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
cve@mitre.orghttp://secunia.com/advisories/42875Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42936Vendor Advisory
cve@mitre.orghttp://support.apple.com/kb/HT4723
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2143
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:222
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:223
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0825.htmlVendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/43676
cve@mitre.orghttp://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0105Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0345Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=640819Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64843
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=55564
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42875Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4723
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2143
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:222
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:223
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0825.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/43676
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0105Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0345Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=640819Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64843
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table."
    },
    {
      "lang": "es",
      "value": "MySQL versiones 5.1 anteriores a 5.1.51 y versiones 5.5 anteriores a 5.5.6, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del servidor mysqld) mediante la realizaci\u00f3n de una asignaci\u00f3n de variable de usuario en una expresi\u00f3n l\u00f3gica que se calcula y almacena en una tabla temporal para GROUP BY y, entonces causar que sea usado el valor de la expresi\u00f3n despu\u00e9s de crear la tabla, lo que causa que la expresi\u00f3n se vuelva a evaluar en lugar de tener acceso a su valor desde la tabla."
    }
  ],
  "id": "CVE-2010-3835",
  "lastModified": "2024-11-21T01:19:42.993",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-14T19:02:42.983",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=55564"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640819"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64843"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=55564"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640819"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64843"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-11 20:00
Modified
2024-11-21 01:19
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=54575
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
cve@mitre.orghttp://secunia.com/advisories/42875Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42936Vendor Advisory
cve@mitre.orghttp://support.apple.com/kb/HT4723
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2143
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:155
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:222
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:012
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2010/09/28/10Exploit
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0825.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.htmlVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/42646
cve@mitre.orghttp://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0105Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0133Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0345Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=628040Exploit
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64688
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=54575
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42875Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4723
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2143
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:155
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:222
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:012
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/28/10Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0825.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/42646
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0105Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0133Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0345Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=628040Exploit
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64688
Impacted products
Vendor Product Version
mysql mysql *
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
mysql mysql *
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.72
mysql mysql 5.0.74
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.28
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.34
oracle mysql 5.0.36
oracle mysql 5.0.38
oracle mysql 5.0.40
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.44
oracle mysql 5.0.45
oracle mysql 5.0.46
oracle mysql 5.0.48
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.56
oracle mysql 5.0.58
oracle mysql 5.0.62
oracle mysql 5.0.64
oracle mysql 5.0.66
oracle mysql 5.0.66
oracle mysql 5.0.67
oracle mysql 5.0.68
oracle mysql 5.0.70
oracle mysql 5.0.72
oracle mysql 5.0.74
oracle mysql 5.0.75
oracle mysql 5.0.76
oracle mysql 5.0.77
oracle mysql 5.0.78
oracle mysql 5.0.79
oracle mysql 5.0.80
oracle mysql 5.0.81
oracle mysql 5.0.82
oracle mysql 5.0.83
oracle mysql 5.0.84
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.87
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3983147C-7775-4FBC-85B1-E33DB1EDD669",
              "versionEndIncluding": "5.1.48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1092CB84-5263-49AF-A9E3-D36FA2A699A3",
              "versionEndIncluding": "5.0.91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE3D740-E7E8-4E4E-BA75-899015500396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "6421D8E6-6769-400E-A7EA-DA683F637F49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB92A552-079E-4A5E-B65E-8A6C956FC7DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5CD839-1C18-44F2-836F-97B85572D491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "4BA355E8-593E-470C-B565-60CD51B14C3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF30535-45D3-4845-8B7C-16F7B6D05F63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "87BAAF59-A8F5-46AB-9CAC-E0F76B47D942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "60540719-8329-47E4-820F-8B4E4AA55AF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "7147148B-BD26-4280-9B3F-1B27551E0CAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:a:*:*:*:*:*:*",
              "matchCriteriaId": "533421DF-D468-4E83-B27D-612778735F8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:b:*:*:*:*:*:*",
              "matchCriteriaId": "1F307DFE-D497-4494-91FF-B056E70C71A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "B15A96B9-3982-49DF-A836-1DBC3FD29EF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "A02DEBB1-65A5-4422-8B75-E8C86EA0B947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB11E34-4045-4ACA-AD7D-48B70D13CD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D2FC440-4D06-4CE2-BE20-A46EB196182F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.66:a:*:*:*:*:*:*",
              "matchCriteriaId": "FFF392C0-4042-4E91-890F-71C0C05AAB56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "455E364E-5010-47D9-8F09-58FE4B15615B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "8462FC32-D6C8-448C-992F-F13C63D163BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B91B6CB-624D-429C-86CD-28CBA1A8AD0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.72:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "E1DFB3DB-FBD9-4542-82B9-C7EA603135EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.74:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "7A77E76D-1CE4-446C-9F2D-18913BE0F4B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01C656F-C7CE-4625-9C7C-A160291E327F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AB3A560-CAC3-4173-BA24-A00E85A10C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9F17925-3F60-4DA8-86D6-596AC8A7466D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF9B3CCC-7FE4-48FA-8DC6-F508999E9406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.82:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "18F1CDDF-D1ED-4A9A-A34F-757C2B8FD4EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.84:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "0E20D59E-D30F-4FCD-B3E7-69BA102E434A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.87:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "DA8DC8BB-6339-4FF7-A334-DE0DDE3FB3B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column."
    },
    {
      "lang": "es",
      "value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49 y versiones 5.0 anteriores a 5.0.92, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio de mysqld) por medio de una consulta join que utiliza una tabla con una columna SET \u00fanica."
    }
  ],
  "id": "CVE-2010-3677",
  "lastModified": "2024-11-21T01:19:22.103",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-11T20:00:01.323",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=54575"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/42646"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628040"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=54575"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42646"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628040"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-05-04 04:00
Modified
2024-11-20 23:48
Severity ?
Summary
mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=108023246916294&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=108206802810402&w=2
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200405-20.xml
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/p-018.shtml
cve@mitre.orghttp://www.debian.org/security/2004/dsa-483
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:034
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-569.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-597.html
cve@mitre.orghttp://www.securityfocus.com/bid/9976Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/15617
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=108023246916294&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=108206802810402&w=2
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200405-20.xml
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/p-018.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-483
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:034
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-569.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-597.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/9976Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/15617
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557
Impacted products
Vendor Product Version
mysql mysql 4.1.0
oracle mysql 3.20.32a
oracle mysql 3.22.26
oracle mysql 3.22.27
oracle mysql 3.22.28
oracle mysql 3.22.29
oracle mysql 3.22.30
oracle mysql 3.22.32
oracle mysql 3.23.2
oracle mysql 3.23.3
oracle mysql 3.23.5
oracle mysql 3.23.8
oracle mysql 3.23.9
oracle mysql 3.23.10
oracle mysql 3.23.22
oracle mysql 3.23.23
oracle mysql 3.23.24
oracle mysql 3.23.25
oracle mysql 3.23.26
oracle mysql 3.23.27
oracle mysql 3.23.28
oracle mysql 3.23.28
oracle mysql 3.23.29
oracle mysql 3.23.30
oracle mysql 3.23.31
oracle mysql 3.23.32
oracle mysql 3.23.33
oracle mysql 3.23.34
oracle mysql 3.23.36
oracle mysql 3.23.37
oracle mysql 3.23.38
oracle mysql 3.23.39
oracle mysql 3.23.40
oracle mysql 3.23.41
oracle mysql 3.23.42
oracle mysql 3.23.43
oracle mysql 3.23.44
oracle mysql 3.23.45
oracle mysql 3.23.46
oracle mysql 3.23.47
oracle mysql 3.23.48
oracle mysql 3.23.49
oracle mysql 3.23.50
oracle mysql 3.23.51
oracle mysql 3.23.52
oracle mysql 3.23.53
oracle mysql 3.23.53a
oracle mysql 3.23.54
oracle mysql 3.23.54a
oracle mysql 3.23.55
oracle mysql 3.23.56
oracle mysql 3.23.58
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.18
oracle mysql 4.1.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.20.32a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B270BC3E-FCB8-4E85-A069-A6AA3D348E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "C883DB55-0CAC-462A-912B-69E9E7E1C79C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "45AD5549-07DC-43DA-B277-D7BF16ABE4E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "787CB28C-74C6-4356-8AB3-4183CD941EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30459B9-0FAC-48DF-9601-AAD1A028846F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "86DC48D3-09F1-48BD-A783-0549D4D5E8B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "209E0C63-FC71-4E19-B3D5-BCB71A758252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EFB2D10-E255-4DD3-BF03-217803CDED24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "37512B4B-C428-4D30-AAF3-9557C7257967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file."
    },
    {
      "lang": "es",
      "value": "mysqlbug de MySQL pemite a usuarios locales sobreescribir  ficheros elgidos arbitrariamente mediante un ataque de enlaces simb\u00f3licos sobre el fichero temporal failed-mysql-bugreport"
    }
  ],
  "id": "CVE-2004-0381",
  "lastModified": "2024-11-20T23:48:27.587",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-05-04T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=108023246916294\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=108206802810402\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200405-20.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2004/dsa-483"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:034"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-569.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/9976"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15617"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=108023246916294\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=108206802810402\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200405-20.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2004/dsa-483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:034"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-569.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/9976"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15617"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:55
Severity ?
Summary
MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.
References
secalert@redhat.comhttp://archives.neohapsis.com/archives/vulnwatch/2005-q1/0082.htmlExploit
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-707Exploit
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200503-19.xmlPatch
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2005:060
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2005_19_mysql.htmlPatch
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-334.htmlPatch
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-348.html
secalert@redhat.comhttp://www.securityfocus.com/bid/12781Patch
secalert@redhat.comhttp://www.trustix.org/errata/2005/0009/Patch
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9591
secalert@redhat.comhttps://usn.ubuntu.com/96-1/
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0082.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-707Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200503-19.xmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:060
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_19_mysql.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-334.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-348.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12781Patch
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2005/0009/Patch
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9591
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/96-1/
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.3
mysql mysql 4.1.10
oracle mysql 3.23.49
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.18
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.23
oracle mysql 4.1.0
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack."
    }
  ],
  "id": "CVE-2005-0711",
  "lastModified": "2024-11-20T23:55:45.103",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0082.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.debian.org/security/2005/dsa-707"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12781"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.trustix.org/errata/2005/0009/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9591"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://usn.ubuntu.com/96-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0082.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.debian.org/security/2005/dsa-707"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12781"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.trustix.org/errata/2005/0009/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9591"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/96-1/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-06 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string.
Impacted products
Vendor Product Version
mysql mysql 4.1.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string."
    },
    {
      "lang": "es",
      "value": "Desbordamiento basado en la pila en MySQL 4.1.x anteriores a 4.1.3, y 5.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante una cadena de permutaci\u00f3n (scramble)."
    }
  ],
  "id": "CVE-2004-0628",
  "lastModified": "2024-11-20T23:49:01.017",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-06T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/645326"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/645326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16612"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-10-06 23:25
Modified
2024-11-21 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document. NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=27884Exploit
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
cve@mitre.orghttp://seclists.org/bugtraq/2008/Oct/0026.html
cve@mitre.orghttp://secunia.com/advisories/32072Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/34907Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/36566
cve@mitre.orghttp://secunia.com/advisories/38517Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/4357
cve@mitre.orghttp://support.apple.com/kb/HT4077
cve@mitre.orghttp://ubuntu.com/usn/usn-897-1
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1783
cve@mitre.orghttp://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2009:094
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2009-1289.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0110.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/496842/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/496877/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/497158/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/497885/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/31486
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/45590
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=27884Exploit
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/bugtraq/2008/Oct/0026.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32072Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34907Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36566
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38517Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/4357
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4077
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-897-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1783
af854a3a-2127-422b-91ae-364da2661108http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:094
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1289.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0110.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/496842/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/496877/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/497158/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/497885/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31486
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/45590
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456
Impacted products
Vendor Product Version
mysql mysql 5.0.4
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
oracle mysql 5.0.26
oracle mysql 5.0.27
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.67



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document.  NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el cliente command-line en MySQL v5.0.26 a la v5.0.45, cuando la opci\u00f3n --html est\u00e1 activa, permite a los atacantes inyectar web script o HTML de su elecci\u00f3n coloc\u00e1ndolo en una celda de la base de datos, a la que puede acceder el cliente al comoponer un documento HTML."
    }
  ],
  "id": "CVE-2008-4456",
  "lastModified": "2024-11-21T00:51:43.277",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-10-06T23:25:50.707",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=27884"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/bugtraq/2008/Oct/0026.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32072"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34907"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/36566"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38517"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/4357"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://ubuntu.com/usn/usn-897-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1783"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/496842/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/496877/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/497158/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/497885/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/31486"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45590"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=27884"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/bugtraq/2008/Oct/0026.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32072"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34907"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36566"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4357"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-897-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1783"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/496842/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/496877/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/497158/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/497885/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/31486"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45590"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-4456\n\nThis issue was addressed for Red Hat Enterprise Linux 5 by https://rhn.redhat.com/errata/RHSA-2009-1289.html and Red Hat Enterprise Linux 4 by https://rhn.redhat.com/errata/RHSA-2010-0110.html .\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, future MySQL package updates may address this flaw for Red Hat Enterprise Linux 3, and Red Hat Application Stack 2.",
      "lastModified": "2010-02-17T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-03-12 23:19
Modified
2024-11-21 00:28
Severity ?
Summary
MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=24630
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.htmlVendor Advisory
cve@mitre.orghttp://secunia.com/advisories/24483Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/24609Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25196Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25389Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25946Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30351Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200705-11.xml
cve@mitre.orghttp://securityreason.com/securityalert/2413
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:139
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0364.htmlVendor Advisory
cve@mitre.orghttp://www.sec-consult.com/284.htmlExploit
cve@mitre.orghttp://www.securityfocus.com/archive/1/462339/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/22900Exploit, Patch
cve@mitre.orghttp://www.securitytracker.com/id?1017746
cve@mitre.orghttp://www.ubuntu.com/usn/usn-440-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/0908Vendor Advisory
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1127
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=24630
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24483Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24609Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25196Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25389Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25946Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30351Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200705-11.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/2413
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:139
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0364.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.sec-consult.com/284.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/462339/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/22900Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017746
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-440-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0908Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1127
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530
Impacted products
Vendor Product Version
mysql mysql *
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.24
mysql mysql 5.0.30
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.32
oracle mysql 5.0.41



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E13E69DD-CFBF-4AC5-BD1D-FD6B3DD4B365",
              "versionEndIncluding": "5.0.33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function."
    },
    {
      "lang": "es",
      "value": "MySQL versi\u00f3n 5.x anterior a 5.0.36, permite a los usuarios locales causar una denegaci\u00f3n de servicio (bloqueo de base de datos) al realizar subselecciones de la tabla information_schema y utilizar ORDER BY para ordenar un resultado de una sola fila, lo que impide que determinados elementos de la estructura se inicialicen y desencadene una desreferencia de NULL en la funci\u00f3n filesort."
    }
  ],
  "id": "CVE-2007-1420",
  "lastModified": "2024-11-21T00:28:16.020",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-03-12T23:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=24630"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24483"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24609"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25196"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25389"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25946"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200705-11.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/2413"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sec-consult.com/284.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/462339/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/22900"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1017746"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-440-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0908"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1127"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=24630"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24609"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25196"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25946"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200705-11.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sec-consult.com/284.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/462339/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/22900"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1017746"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-440-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1127"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "This issue did not affect mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3, and 4.\n\nIssue was addressed in mysql packages as shipped in Red Hat Enterprise Linux 5 via:\n\nhttps://rhn.redhat.com/errata/RHSA-2008-0364.html",
      "lastModified": "2008-07-25T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-11 20:00
Modified
2024-11-21 01:19
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=54477Exploit, Patch
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
cve@mitre.orghttp://secunia.com/advisories/42936Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:155
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:012
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2010/09/28/10Exploit, Patch
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/42596
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0133Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=628172Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=54477Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:155
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:012
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/28/10Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/42596
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0133Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=628172Exploit, Patch
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier."
    },
    {
      "lang": "es",
      "value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo) por medio de operaciones (1) IN o (2) CASE con argumentos NULL que son especificados expl\u00edcitamente o indirectamente proporcionados por el modificador WITH ROLLUP."
    }
  ],
  "id": "CVE-2010-3678",
  "lastModified": "2024-11-21T01:19:22.300",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-11T20:00:01.387",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=54477"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/42596"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=54477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42596"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628172"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:34
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la confidencialidad y la integridad de los datos a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2012-0116",
  "lastModified": "2024-11-21T01:34:25.200",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:06.727",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:34
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0113.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0113."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente de MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la confidencialidad y la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a la CVE-2012-0113."
    }
  ],
  "id": "CVE-2012-0118",
  "lastModified": "2024-11-21T01:34:25.440",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.9,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:06.867",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-05-05 12:46
Modified
2024-11-21 00:09
Severity ?
Summary
The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
References
security@debian.orghttp://bugs.debian.org/365938
security@debian.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.htmlPatch
security@debian.orghttp://docs.info.apple.com/article.html?artnum=305214
security@debian.orghttp://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
security@debian.orghttp://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
security@debian.orghttp://secunia.com/advisories/19929Patch, Vendor Advisory
security@debian.orghttp://secunia.com/advisories/20002
security@debian.orghttp://secunia.com/advisories/20073
security@debian.orghttp://secunia.com/advisories/20076
security@debian.orghttp://secunia.com/advisories/20223
security@debian.orghttp://secunia.com/advisories/20241
security@debian.orghttp://secunia.com/advisories/20253
security@debian.orghttp://secunia.com/advisories/20333
security@debian.orghttp://secunia.com/advisories/20424
security@debian.orghttp://secunia.com/advisories/20457
security@debian.orghttp://secunia.com/advisories/20625
security@debian.orghttp://secunia.com/advisories/20762
security@debian.orghttp://secunia.com/advisories/24479
security@debian.orghttp://secunia.com/advisories/29847
security@debian.orghttp://securityreason.com/securityalert/840
security@debian.orghttp://securitytracker.com/id?1016017Patch
security@debian.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
security@debian.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
security@debian.orghttp://www.debian.org/security/2006/dsa-1071
security@debian.orghttp://www.debian.org/security/2006/dsa-1073
security@debian.orghttp://www.debian.org/security/2006/dsa-1079
security@debian.orghttp://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
security@debian.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:084
security@debian.orghttp://www.novell.com/linux/security/advisories/2006-06-02.html
security@debian.orghttp://www.redhat.com/support/errata/RHSA-2006-0544.html
security@debian.orghttp://www.securityfocus.com/archive/1/432733/100/0/threaded
security@debian.orghttp://www.securityfocus.com/archive/1/434164/100/0/threaded
security@debian.orghttp://www.securityfocus.com/bid/17780
security@debian.orghttp://www.trustix.org/errata/2006/0028
security@debian.orghttp://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
security@debian.orghttp://www.vupen.com/english/advisories/2006/1633
security@debian.orghttp://www.vupen.com/english/advisories/2007/0930
security@debian.orghttp://www.vupen.com/english/advisories/2008/1326/references
security@debian.orghttp://www.wisec.it/vulns.php?page=7Patch
security@debian.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26236
security@debian.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918
security@debian.orghttps://usn.ubuntu.com/283-1/
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/365938
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=305214
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19929Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20002
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20073
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20076
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20223
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20241
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20253
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20333
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20424
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20457
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20625
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20762
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24479
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29847
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/840
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016017Patch
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1071
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1073
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1079
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:084
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006-06-02.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0544.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/432733/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434164/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/17780
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0028
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1633
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0930
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1326/references
af854a3a-2127-422b-91ae-364da2661108http://www.wisec.it/vulns.php?page=7Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26236
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/283-1/
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.3
mysql mysql 4.1.8
mysql mysql 4.1.10
mysql mysql 4.1.12
mysql mysql 4.1.13
mysql mysql 4.1.14
mysql mysql 4.1.15
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.16
oracle mysql 4.0.17
oracle mysql 4.0.18
oracle mysql 4.0.19
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.23
oracle mysql 4.0.24
oracle mysql 4.0.25
oracle mysql 4.0.26
oracle mysql 4.1.0
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5
oracle mysql 4.1.6
oracle mysql 4.1.7
oracle mysql 4.1.9
oracle mysql 4.1.11
oracle mysql 4.1.16
oracle mysql 4.1.17
oracle mysql 4.1.18
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read."
    }
  ],
  "id": "CVE-2006-1516",
  "lastModified": "2024-11-21T00:09:04.663",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-05T12:46:00.000",
  "references": [
    {
      "source": "security@debian.org",
      "url": "http://bugs.debian.org/365938"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
    },
    {
      "source": "security@debian.org",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "security@debian.org",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "security@debian.org",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19929"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20002"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20073"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20076"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20223"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20241"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20253"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20333"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20424"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20457"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20625"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/20762"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "security@debian.org",
      "url": "http://secunia.com/advisories/29847"
    },
    {
      "source": "security@debian.org",
      "url": "http://securityreason.com/securityalert/840"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016017"
    },
    {
      "source": "security@debian.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377"
    },
    {
      "source": "security@debian.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.debian.org/security/2006/dsa-1071"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.debian.org/security/2006/dsa-1073"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.debian.org/security/2006/dsa-1079"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securityfocus.com/archive/1/432733/100/0/threaded"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securityfocus.com/bid/17780"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.trustix.org/errata/2006/0028"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.vupen.com/english/advisories/2006/1633"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.vupen.com/english/advisories/2008/1326/references"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.wisec.it/vulns.php?page=7"
    },
    {
      "source": "security@debian.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26236"
    },
    {
      "source": "security@debian.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918"
    },
    {
      "source": "security@debian.org",
      "url": "https://usn.ubuntu.com/283-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/365938"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19929"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20333"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20424"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20762"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/840"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/432733/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17780"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1633"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1326/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.wisec.it/vulns.php?page=7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26236"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/283-1/"
    }
  ],
  "sourceIdentifier": "security@debian.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2003-09-22 04:00
Modified
2024-11-20 23:45
Severity ?
Summary
Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000743
cve@mitre.orghttp://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=106364207129993&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=106381424420775&w=2
cve@mitre.orghttp://secunia.com/advisories/9709
cve@mitre.orghttp://www.debian.org/security/2003/dsa-381Patch, Vendor Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/516492US Government Resource
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2003:094
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-281.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-282.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/337012Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000743
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=106364207129993&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=106381424420775&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/9709
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2003/dsa-381Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/516492US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2003:094
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-281.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-282.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/337012Exploit, Patch, Vendor Advisory
Impacted products
Vendor Product Version
mysql mysql 4.1.0
oracle mysql 3.23
oracle mysql 3.23.2
oracle mysql 3.23.3
oracle mysql 3.23.4
oracle mysql 3.23.5
oracle mysql 3.23.8
oracle mysql 3.23.9
oracle mysql 3.23.10
oracle mysql 3.23.22
oracle mysql 3.23.23
oracle mysql 3.23.24
oracle mysql 3.23.25
oracle mysql 3.23.26
oracle mysql 3.23.27
oracle mysql 3.23.28
oracle mysql 3.23.28
oracle mysql 3.23.29
oracle mysql 3.23.30
oracle mysql 3.23.31
oracle mysql 3.23.32
oracle mysql 3.23.33
oracle mysql 3.23.34
oracle mysql 3.23.36
oracle mysql 3.23.37
oracle mysql 3.23.38
oracle mysql 3.23.39
oracle mysql 3.23.40
oracle mysql 3.23.41
oracle mysql 3.23.42
oracle mysql 3.23.43
oracle mysql 3.23.44
oracle mysql 3.23.45
oracle mysql 3.23.46
oracle mysql 3.23.47
oracle mysql 3.23.48
oracle mysql 3.23.49
oracle mysql 3.23.50
oracle mysql 3.23.51
oracle mysql 3.23.52
oracle mysql 3.23.53
oracle mysql 3.23.53a
oracle mysql 3.23.54
oracle mysql 3.23.54a
oracle mysql 3.23.55
oracle mysql 3.23.56
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.1.0
conectiva linux 7.0
conectiva linux 8.0
conectiva linux 9.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DBBAC9-AA05-409F-82B2-A552A3417E45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EFB2D10-E255-4DD3-BF03-217803CDED24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:conectiva:linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "97177EF7-8FC4-4D4D-A8D9-3628AA0035FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:conectiva:linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD14661C-E3BE-44DF-BC8D-294322BF23EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4007B0D-9606-46BD-866A-7911BEA292BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en get_salt_from_password de sql_acl.cc de MySQL 4.0.14 y anteriores, y 3.23.x, permite a atacantes ejecutar c\u00f3digo arbitrario mediante un campo de contrase\u00f1a largo."
    }
  ],
  "id": "CVE-2003-0780",
  "lastModified": "2024-11-20T23:45:30.510",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-09-22T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/9709"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2003/dsa-381"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/516492"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/337012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/9709"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2003/dsa-381"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/516492"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/337012"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-12-10 21:46
Modified
2024-11-21 00:39
Severity ?
Summary
MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=29908Exploit
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html
cve@mitre.orghttp://lists.mysql.com/announce/502
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
cve@mitre.orghttp://secunia.com/advisories/28025Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28063Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28739
cve@mitre.orghttp://secunia.com/advisories/28838Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29443Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29706Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-04.xml
cve@mitre.orghttp://securitytracker.com/id?1019085
cve@mitre.orghttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:017
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-1157.htmlVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/487606/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/26832
cve@mitre.orghttp://www.ubuntu.com/usn/usn-588-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/4198Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/38989
cve@mitre.orghttps://issues.rpath.com/browse/RPL-2187
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=29908Exploit
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/announce/502
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28025Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28063Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28739
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28838Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29443Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29706Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-04.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1019085
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:017
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1157.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/487606/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26832
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-588-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4198Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/38989
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2187
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html
Impacted products
Vendor Product Version
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
oracle mysql 5.0.41
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 6.0.0
oracle mysql 6.0.1
oracle mysql 6.0.2
oracle mysql 6.0.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F48E7355-2D9A-454D-AE66-B0AE015E31A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E51BF67A-BAEC-48F8-9290-67C6C5B8442E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5C6A2F-DEAE-470D-8888-0E9076CCA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C09231E-8759-4DFB-AA8D-17A1C6D43AC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement."
    },
    {
      "lang": "es",
      "value": "MySQL versiones 5.0.x anteriores a 5.0.51a, versiones 5.1.x anteriores a 5.1.23 y versiones 6.0.x anteriores a 6.0.4, no actualizan el valor DEFINER de una vista cuando se modifica la vista, lo que permite a usuarios remotos autenticados alcanzar privilegios por medio de una secuencia de sentencias, incluyendo una sentencia CREATE SQL SECURITY DEFINER VIEW y una sentencia ALTER VIEW."
    }
  ],
  "id": "CVE-2007-6303",
  "lastModified": "2024-11-21T00:39:49.187",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-12-10T21:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=29908"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.mysql.com/announce/502"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28025"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28063"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28739"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28838"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29443"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29706"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1019085"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/26832"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-588-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4198"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38989"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-2187"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=29908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.mysql.com/announce/502"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28063"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28739"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28838"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29443"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1019085"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26832"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-588-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4198"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38989"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2187"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "This issue did not affect the mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3, 4, or 5.\n\nThis issue affected the mysql packages as shipped in Red Hat Application Stack v1 and v2 and was addressed by RHSA-2007:1157:\nhttp://rhn.redhat.com/errata/RHSA-2007-1157.html",
      "lastModified": "2008-01-09T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-11-10 02:46
Modified
2024-11-21 00:38
Severity ?
Summary
The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.
References
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=198988
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=32125
cve@mitre.orghttp://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
cve@mitre.orghttp://secunia.com/advisories/27568
cve@mitre.orghttp://secunia.com/advisories/27649
cve@mitre.orghttp://secunia.com/advisories/27823
cve@mitre.orghttp://secunia.com/advisories/28025
cve@mitre.orghttp://secunia.com/advisories/28040
cve@mitre.orghttp://secunia.com/advisories/28099
cve@mitre.orghttp://secunia.com/advisories/28108
cve@mitre.orghttp://secunia.com/advisories/28128
cve@mitre.orghttp://secunia.com/advisories/28838
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200711-25.xml
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1413
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:243
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-1155.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-1157.html
cve@mitre.orghttp://www.securityfocus.com/bid/26353
cve@mitre.orghttp://www.securitytracker.com/id?1018978
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3903
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/38284
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390
cve@mitre.orghttps://usn.ubuntu.com/559-1/
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=198988
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=32125
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27568
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27649
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27823
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28025
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28040
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28099
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28108
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28128
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28838
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200711-25.xml
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1413
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:243
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1155.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1157.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26353
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018978
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3903
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/38284
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/559-1/
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html
Impacted products
Vendor Product Version
mysql mysql *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A64B25C-DF8F-46BC-BA7A-8A93A6230192",
              "versionEndIncluding": "5.1.23_bk",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n convert_search_mode_to_innobase del ha_innodb.cc en el motor InnoDB  del 5.1.23-BK y versiones anteriores permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (ca\u00edda de la base de datos) a trav\u00e9s de ciertas operaciones CONTAINS sobre un \u00edndice de una columna,  lo que dispara una afirmaci\u00f3n de error."
    }
  ],
  "id": "CVE-2007-5925",
  "lastModified": "2024-11-21T00:38:57.603",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-11-10T02:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=198988"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=32125"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27568"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27649"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27823"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28025"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28040"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28099"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28108"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28128"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28838"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200711-25.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1413"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/26353"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018978"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/3903"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/559-1/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=198988"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=32125"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27568"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27649"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28040"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28108"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28128"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28838"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200711-25.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26353"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018978"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3903"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/559-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-05-03 22:55
Modified
2024-11-21 01:37
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.2
mysql mysql 4.1.3
mysql mysql 4.1.8
mysql mysql 4.1.10
mysql mysql 4.1.12
mysql mysql 4.1.13
mysql mysql 4.1.14
mysql mysql 4.1.15
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.24
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
mysql mysql_community_server 5.1.1
mysql mysql_community_server 5.1.2
mysql mysql_community_server 5.1.3
mysql mysql_community_server 5.1.4
mysql mysql_community_server 5.1.5
mysql mysql_community_server 5.1.6
mysql mysql_community_server 5.1.7
mysql mysql_community_server 5.1.8
mysql mysql_community_server 5.1.9
mysql mysql_community_server 5.1.10
mysql mysql_community_server 5.1.11
mysql mysql_community_server 5.1.12
mysql mysql_community_server 5.1.13
mysql mysql_community_server 5.1.14
mysql mysql_community_server 5.1.15
mysql mysql_community_server 5.1.16
mysql mysql_community_server 5.1.17
mysql mysql_community_server 5.1.18
mysql mysql_community_server 5.1.19
mysql mysql_community_server 5.1.20
mysql mysql_community_server 5.1.21
mysql mysql_community_server 5.1.22
mysql mysql_server 5.1.22
oracle mysql *
oracle mysql 3.20
oracle mysql 3.20.32a
oracle mysql 3.21
oracle mysql 3.22
oracle mysql 3.22.26
oracle mysql 3.22.27
oracle mysql 3.22.28
oracle mysql 3.22.29
oracle mysql 3.22.30
oracle mysql 3.22.32
oracle mysql 3.23
oracle mysql 3.23.0
oracle mysql 3.23.1
oracle mysql 3.23.2
oracle mysql 3.23.3
oracle mysql 3.23.4
oracle mysql 3.23.5
oracle mysql 3.23.6
oracle mysql 3.23.7
oracle mysql 3.23.8
oracle mysql 3.23.9
oracle mysql 3.23.10
oracle mysql 3.23.11
oracle mysql 3.23.12
oracle mysql 3.23.13
oracle mysql 3.23.14
oracle mysql 3.23.15
oracle mysql 3.23.16
oracle mysql 3.23.17
oracle mysql 3.23.18
oracle mysql 3.23.19
oracle mysql 3.23.20
oracle mysql 3.23.21
oracle mysql 3.23.22
oracle mysql 3.23.23
oracle mysql 3.23.24
oracle mysql 3.23.25
oracle mysql 3.23.26
oracle mysql 3.23.27
oracle mysql 3.23.28
oracle mysql 3.23.28
oracle mysql 3.23.29
oracle mysql 3.23.30
oracle mysql 3.23.31
oracle mysql 3.23.32
oracle mysql 3.23.33
oracle mysql 3.23.34
oracle mysql 3.23.35
oracle mysql 3.23.36
oracle mysql 3.23.37
oracle mysql 3.23.38
oracle mysql 3.23.39
oracle mysql 3.23.40
oracle mysql 3.23.41
oracle mysql 3.23.42
oracle mysql 3.23.43
oracle mysql 3.23.44
oracle mysql 3.23.45
oracle mysql 3.23.46
oracle mysql 3.23.47
oracle mysql 3.23.48
oracle mysql 3.23.49
oracle mysql 3.23.50
oracle mysql 3.23.51
oracle mysql 3.23.52
oracle mysql 3.23.53
oracle mysql 3.23.53a
oracle mysql 3.23.54
oracle mysql 3.23.54a
oracle mysql 3.23.55
oracle mysql 3.23.56
oracle mysql 3.23.57
oracle mysql 3.23.58
oracle mysql 3.23.59
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.16
oracle mysql 4.0.17
oracle mysql 4.0.18
oracle mysql 4.0.19
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.23
oracle mysql 4.0.24
oracle mysql 4.0.25
oracle mysql 4.0.26
oracle mysql 4.0.27
oracle mysql 4.1.0
oracle mysql 4.1.1
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5
oracle mysql 4.1.6
oracle mysql 4.1.7
oracle mysql 4.1.9
oracle mysql 4.1.11
oracle mysql 4.1.16
oracle mysql 4.1.17
oracle mysql 4.1.18
oracle mysql 4.1.19
oracle mysql 4.1.20
oracle mysql 4.1.21
oracle mysql 4.1.22
oracle mysql 5.0.41
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.20
oracle mysql 5.5.21
oracle mysql_connector\/j 5.1.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D57F50-6907-4F3A-B6C8-A7F96191E57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AA549DB-8870-41C2-881A-018C1FA66A9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C4F943-4457-43CB-BCD4-89A593446877",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F9345D2-DFFC-4932-B967-996363D5556F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A950B554-660F-474E-A0E0-55EAE4CF0ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E77E350-47C9-4286-8B2E-2021974F2AE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB79AEDA-C256-4B5C-953F-5C8BFFF80612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D6F573E-B1E5-4AB3-BEA7-130EF8AD51C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62D4CC90-D892-4E1D-A6D7-9A50FAF9466C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D211EF2D-AF05-441E-8C6C-7F3CB4AFC417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A79BEFA-B205-4C94-9575-EB970823B935",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "16939E17-0791-4B50-A6E1-4A2FF3C02109",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D39E098-FBFC-42EC-835B-AB487807D176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "902F6029-CB42-4A3B-9D9B-4F5134871685",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7428EF7D-3ECA-4C54-A945-AD03CA3EEA49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "798A89AA-4CD7-4402-9B14-B45970022C1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "879DEFCF-B345-41ED-8A2E-531FBD7A2FEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "8313D34E-CE00-4B0B-B30F-9E2591BD515A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E05202-0E64-4698-970A-DCF665E0E9A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C85219E-C93F-4DCC-9507-AD6B00CAD687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC835BFC-8AE7-4A01-99C1-C7EFDBFA8A16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A022751-FE6D-4C5D-AB02-22C44D7E6B1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_server:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB22F327-7795-4B25-B40E-5684F2A5B0BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A36F82C-6EBF-497B-9C20-AFB2007AA684",
              "versionEndIncluding": "5.5.19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "578BA199-EF04-4595-AFDE-54FD66B7FC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.20.32a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B270BC3E-FCB8-4E85-A069-A6AA3D348E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82E464F-3871-40C7-A758-B81582D193AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "05B7E2C5-6139-47F9-A310-F2BC0EF83942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "C883DB55-0CAC-462A-912B-69E9E7E1C79C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "45AD5549-07DC-43DA-B277-D7BF16ABE4E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "787CB28C-74C6-4356-8AB3-4183CD941EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30459B9-0FAC-48DF-9601-AAD1A028846F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "86DC48D3-09F1-48BD-A783-0549D4D5E8B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "209E0C63-FC71-4E19-B3D5-BCB71A758252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DBBAC9-AA05-409F-82B2-A552A3417E45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "EA087258-8A5B-472E-B120-9B56415F8869",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "204CF85D-DFAD-4052-B24A-DCE09B32426E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B78C9D8-E6BC-4D80-8C29-219C1F151570",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A7DE48-60E6-42FE-8986-0DB1647C1BFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D5DFB7-1AA6-468D-A077-5BB4B32C92B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C786D54-7DEC-41B8-A778-BED9DA66C3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0F32D6-B2A9-4AC3-A4F9-E4A291AEC91A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1BD316B-5855-462D-B378-6AAF9817F23D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "38D864BB-32A6-44FC-870F-3663E53F2277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F5BA337-5845-4E3E-8DB5-AAB81A460376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BC06D07-8C16-48D4-A95E-8F40CFAE6514",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B9CEC-580F-4143-B111-032195BCC760",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F41E62F-A606-4842-985C-2B349C405E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.20:beta:*:*:*:*:*:*",
              "matchCriteriaId": "9EF1E839-E1C9-4A13-A6BA-6F8C56FDF148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "692E4E06-D559-4735-AED5-CE9E572CF608",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "77B463E6-DAD6-4013-8095-F0153F8B335F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EFB2D10-E255-4DD3-BF03-217803CDED24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A46F3F-7A97-4AE5-885B-15E25BC575C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "37512B4B-C428-4D30-AAF3-9557C7257967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B1527A-5039-470B-87DC-B02F557364A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8105AE3-7FF6-43C5-9B47-29ACD4DD7C3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "48BA51FF-B163-4522-8D78-AF9C05D50511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql_connector\\/j:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBF02F4-97EE-4300-A7F4-033D190788F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente de servidor MySQL en Oracle MySQL v5.5.19 y anteriores permite a usuarios remotos autenticados afectar a la disponibilidad a trav\u00e9s de vectores desconocidos relacionados con el Optimizador de servidor."
    }
  ],
  "id": "CVE-2012-1696",
  "lastModified": "2024-11-21T01:37:28.960",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-05-03T22:55:02.637",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48890"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/49179"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securityfocus.com/bid/53071"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securitytracker.com/id?1026934"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48890"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026934"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-17 04:00
Modified
2024-11-20 23:57
Severity ?
Summary
mysql_install_db in MySQL 4.1.x before 4.1.12 and 5.x up to 5.0.4 creates the mysql_install_db.X file with a predictable filename and insecure permissions, which allows local users to execute arbitrary SQL commands by modifying the file's contents.
Impacted products
Vendor Product Version
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 5.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "mysql_install_db in MySQL 4.1.x before 4.1.12 and 5.x up to 5.0.4 creates the mysql_install_db.X file with a predictable filename and insecure permissions, which allows local users to execute arbitrary SQL commands by modifying the file\u0027s contents."
    }
  ],
  "id": "CVE-2005-1636",
  "lastModified": "2024-11-20T23:57:47.123",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-17T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=full-disclosure\u0026m=111632686805498\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/15369"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17080"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:045"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-685.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/13660"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.zataz.net/adviso/mysql-05172005.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=111632686805498\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/15369"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:045"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-685.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/13660"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.zataz.net/adviso/mysql-05172005.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-17 00:55
Modified
2024-11-21 01:39
Severity ?
Summary
MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.1.62
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21
oracle mysql 5.5.22
oracle mysql 5.5.23



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF9060C-9469-48DA-858A-BB42E77AF88F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "54047553-C08F-474C-8650-89AAAC68056B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "41EE02F4-02F7-49A3-AFCA-C20BA2AF65C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index."
    },
    {
      "lang": "es",
      "value": "MySQL v5.1.x antes de v5.1.63 y v5.5.x antes de v5.5.24 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (por ca\u00edda de mysqld) a trav\u00e9s de vectores relacionados con un c\u00e1lculo incorrecto y un \u00edndice de orden de clasificaci\u00f3n.\r\n"
    }
  ],
  "id": "CVE-2012-2749",
  "lastModified": "2024-11-21T01:39:34.033",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-17T00:55:03.517",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/51309"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/55120"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51309"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55120"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-17 00:55
Modified
2024-11-21 01:38
Severity ?
Summary
MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT."
    },
    {
      "lang": "es",
      "value": "MySQL v5.1.x antes de v5.1.62 y v5.5.x antes de v5.5.22 permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (error de aserci\u00f3n y parada no ordenada de mysqld) mediante la supresi\u00f3n de un registro y usando \u0027HANDLER READ NEXT\u0027.\r\n"
    }
  ],
  "id": "CVE-2012-2102",
  "lastModified": "2024-11-21T01:38:29.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-17T00:55:03.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/04/13/7"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/52931"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/04/13/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/52931"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-01-10 23:46
Modified
2024-11-21 00:41
Severity ?
Summary
Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.
References
cve@mitre.orghttp://bugs.mysql.com/33814Permissions Required
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.htmlNot Applicable
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/28324Not Applicable
cve@mitre.orghttp://secunia.com/advisories/28419Not Applicable
cve@mitre.orghttp://secunia.com/advisories/28597Not Applicable
cve@mitre.orghttp://secunia.com/advisories/29443Not Applicable
cve@mitre.orghttp://secunia.com/advisories/32222Not Applicable
cve@mitre.orghttp://securityreason.com/securityalert/3531Third Party Advisory
cve@mitre.orghttp://support.apple.com/kb/HT3216Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1478Third Party Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:150Broken Link
cve@mitre.orghttp://www.securityfocus.com/archive/1/485810/100/0/threadedThird Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/archive/1/485811/100/0/threadedThird Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/27140Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/31681Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/usn-588-1Third Party Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0560/referencesPermissions Required
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2780Permissions Required
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/39429VDB Entry
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/39431VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/33814Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.htmlNot Applicable
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28324Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28419Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28597Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29443Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32222Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3531Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3216Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1478Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:150Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/485810/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/485811/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27140Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31681Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-588-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0560/referencesPermissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2780Permissions Required
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/39429VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/39431VDB Entry
Impacted products
Vendor Product Version
yassl yassl *
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.1.5
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.28
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.34
oracle mysql 5.0.36
oracle mysql 5.0.38
oracle mysql 5.0.40
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.44
oracle mysql 5.0.45
oracle mysql 5.0.46
oracle mysql 5.0.48
oracle mysql 5.0.50
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.56
oracle mysql 5.0.58
oracle mysql 5.0.60
oracle mysql 5.0.62
oracle mysql 5.0.64
oracle mysql 5.0.66
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
apple mac_os_x 10.5.4
debian debian_linux 5.0
canonical ubuntu_linux 6.06
canonical ubuntu_linux 6.10
canonical ubuntu_linux 7.04
canonical ubuntu_linux 7.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:yassl:yassl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E11538C-D2F9-4D94-8C84-69BDC305D744",
              "versionEndIncluding": "1.7.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB92A552-079E-4A5E-B65E-8A6C956FC7DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5CD839-1C18-44F2-836F-97B85572D491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "4BA355E8-593E-470C-B565-60CD51B14C3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF30535-45D3-4845-8B7C-16F7B6D05F63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "87BAAF59-A8F5-46AB-9CAC-E0F76B47D942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "60540719-8329-47E4-820F-8B4E4AA55AF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "7147148B-BD26-4280-9B3F-1B27551E0CAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "DC81D22D-72FE-4FEC-8277-A994B184B91C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "B15A96B9-3982-49DF-A836-1DBC3FD29EF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "A02DEBB1-65A5-4422-8B75-E8C86EA0B947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "56225075-5A65-409E-AFC9-CACA381EAC29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB11E34-4045-4ACA-AD7D-48B70D13CD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D2FC440-4D06-4CE2-BE20-A46EB196182F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "455E364E-5010-47D9-8F09-58FE4B15615B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "10082781-B93E-4B84-94F2-FA9749B4D92B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
              "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) \"input_buffer\u0026 operator\u003e\u003e\" in yassl_imp.cpp."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer en yaSSL 1.7.5 y anteriores, como el utilizado en MySQL y posiblemente otros productos, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante (1) la funci\u00f3n ProcessOldClientHello en handshake.cpp o (2) \"input_buffer\u0026 operator\u003e\u003e\" en yassl_imp.cpp."
    }
  ],
  "id": "CVE-2008-0226",
  "lastModified": "2024-11-21T00:41:26.870",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-01-10T23:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://bugs.mysql.com/33814"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/28324"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/28419"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/28597"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/29443"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/32222"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://securityreason.com/securityalert/3531"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT3216"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1478"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/485810/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/485811/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/27140"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/31681"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-588-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0560/references"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2780"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://bugs.mysql.com/33814"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/28324"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/28419"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/28597"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/29443"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://secunia.com/advisories/32222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://securityreason.com/securityalert/3531"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT3216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/485810/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/485811/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/27140"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/31681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-588-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0560/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2780"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, Red Hat Application Stack v1, and v2, as they are not built with yaSSL support.",
      "lastModified": "2008-01-11T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-07-21 14:03
Modified
2024-11-21 00:13
Severity ?
Summary
Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=20729
cve@mitre.orghttp://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=305214
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
cve@mitre.orghttp://secunia.com/advisories/21147Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/21366Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/24479Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31226Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200608-09.xml
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1112Patch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0768.html
cve@mitre.orghttp://www.securityfocus.com/bid/19032
cve@mitre.orghttp://www.ubuntu.com/usn/usn-321-1
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/0930Vendor Advisory
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=20729
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=305214
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21147Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21366Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24479Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31226Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200608-09.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1112Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0768.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19032
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-321-1
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0930Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827
Impacted products
Vendor Product Version
mysql mysql 4.1.8
mysql mysql 4.1.12
mysql mysql 4.1.13
mysql mysql 4.1.14
mysql mysql 4.1.15
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
oracle mysql 4.1.6
oracle mysql 4.1.7
oracle mysql 4.1.9
oracle mysql 4.1.11
oracle mysql 4.1.16
oracle mysql 4.1.18
oracle mysql 4.1.19
oracle mysql 4.1.20
oracle mysql 5.0.6
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.18
oracle mysql 5.0.19



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de cadena de formato en time.cc de MySQL Server 4.1 anterior a 4.1.21 y 5.0 anterior al 1 de abril de 2006 permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante una cadena de formato en lugar de una fecha como el primer par\u00e1metro para la funci\u00f3n date_format, la cual es posteriormente utilizada en una llamada de escritura formateada para mostrar el mensaje de error."
    }
  ],
  "id": "CVE-2006-3469",
  "lastModified": "2024-11-21T00:13:41.040",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-07-21T14:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=20729"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21147"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21366"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31226"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200608-09.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2006/dsa-1112"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19032"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-321-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=20729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21147"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21366"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200608-09.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2006/dsa-1112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-321-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "This issue was addressed in mysql packages as shipped in Red Hat Enterprise Linux 4 via:\n\nhttps://rhn.redhat.com/errata/RHSA-2008-0768.html\n\nThis issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1, 3, or 5, and Red Hat Application Stack v1 and v2.",
      "lastModified": "2008-07-25T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-11-03 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.
References
cve@mitre.orghttp://bugs.mysql.com/2408Exploit, Vendor Advisory
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892Broken Link
cve@mitre.orghttp://lists.mysql.com/internals/16168Vendor Advisory
cve@mitre.orghttp://lists.mysql.com/internals/16173Vendor Advisory
cve@mitre.orghttp://lists.mysql.com/internals/16174Vendor Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110140517515735&w=2Mailing List, Third Party Advisory
cve@mitre.orghttp://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15
cve@mitre.orghttp://secunia.com/advisories/12783/Third Party Advisory
cve@mitre.orghttp://securitytracker.com/id?1011606Third Party Advisory, VDB Entry
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1Broken Link
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/p-018.shtmlBroken Link
cve@mitre.orghttp://www.debian.org/security/2004/dsa-562Third Party Advisory
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200410-22.xmlThird Party Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-597.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-611.htmlThird Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/11357Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.trustix.org/errata/2004/0054/Broken Link
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17667Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/2408Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892Broken Link
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/internals/16168Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/internals/16173Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/internals/16174Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110140517515735&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/12783/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1011606Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/p-018.shtmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-562Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200410-22.xmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-597.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-611.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11357Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2004/0054/Broken Link
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17667Third Party Advisory, VDB Entry
Impacted products
Vendor Product Version
mysql mysql 4.1.0
oracle mysql *
oracle mysql *
debian debian_linux 3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4E0733B-5C1C-4579-9FD2-251E45E8D93F",
              "versionEndExcluding": "3.23.49",
              "versionStartIncluding": "3.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9CB33C2-B487-4DC3-A7F4-4A9D61EA12FD",
              "versionEndExcluding": "4.0.21",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs."
    },
    {
      "lang": "es",
      "value": "MySQL 4 anteriores a 4.0.21 y 3.x anteriores a 3.23.49 permiten a atacantes causar una denegaci\u00f3n de servicio (ca\u00edda o cuelgue) mediante m\u00faltiples hilos de ejecuci\u00f3n que alter\u00e1n simultaneamente UNIONes de tablas MERGE."
    }
  ],
  "id": "CVE-2004-0837",
  "lastModified": "2024-11-20T23:49:31.980",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-11-03T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/2408"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.mysql.com/internals/16168"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.mysql.com/internals/16173"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.mysql.com/internals/16174"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/12783/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1011606"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-562"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/11357"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.trustix.org/errata/2004/0054/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/2408"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.mysql.com/internals/16168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.mysql.com/internals/16173"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.mysql.com/internals/16174"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/12783/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1011606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-562"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/11357"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.trustix.org/errata/2004/0054/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-03-28 23:55
Modified
2024-11-21 01:35
Severity ?
Summary
Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.1.62
oracle mysql 5.1.63
oracle mysql 5.1.64
oracle mysql 5.1.65
oracle mysql 5.1.66
oracle mysql 5.1.67
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21
oracle mysql 5.5.22
oracle mysql 5.5.23
oracle mysql 5.5.24
oracle mysql 5.5.25
oracle mysql 5.5.25
oracle mysql 5.5.26
oracle mysql 5.5.27



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF9060C-9469-48DA-858A-BB42E77AF88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E268D9E-0C18-4257-8820-634B7357BEE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "0942892C-2106-4F1F-AEBE-78C1CF55E363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE6C87CE-8BA5-4701-B295-7672AF52E6B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EABA08A-81F1-46ED-BF57-FA63229DDCE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FD6AA9F-7F35-4522-B396-C2179ED9B490",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "54047553-C08F-474C-8650-89AAAC68056B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "41EE02F4-02F7-49A3-AFCA-C20BA2AF65C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "97045EB4-F22C-4694-BFB2-C1EA72705206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "88DC6246-988E-4259-8BAF-4F104ED12936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:*",
              "matchCriteriaId": "C34D221E-E9D9-4A1D-B3BC-CB66456D004B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF95406-DAA6-4164-95CE-F88F19C8DE24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "65EF36A4-EC77-46FA-B9E9-24B8DBC71BE2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en yaSSL, usado en MySQL v5.1.x antes de v5.1.68 y v5.5.x antes de v5.5.28, tiene un impacto no especificado y vectores de ataque, una vulnerabilidad diferente a CVE-2013-1492."
    }
  ],
  "id": "CVE-2012-0553",
  "lastModified": "2024-11-21T01:35:13.880",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-03-28T23:55:01.237",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/52445"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/52445"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-14 19:02
Modified
2024-11-21 01:19
Severity ?
Summary
MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function's result is "processed using an intermediate temporary table."
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=54461
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
cve@mitre.orghttp://secunia.com/advisories/42875Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42936
cve@mitre.orghttp://support.apple.com/kb/HT4723
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2143
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:222
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:223
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0825.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/43676
cve@mitre.orghttp://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0105
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0345
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=640858Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64840
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=54461
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42875Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4723
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2143
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:222
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:223
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0825.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/43676
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0105
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0345
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=640858Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64840
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.45b
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.27
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function\u0027s result is \"processed using an intermediate temporary table.\""
    },
    {
      "lang": "es",
      "value": "MySQL v5.0 antes de v5.0.92, v5.1 antes de v5.1.51, y v5.5 antes de v5.5.6 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (por ca\u00edda del servidor) a trav\u00e9s de una consulta que utiliza el las funciones (1) GREATEST o (2) LEAST con una lista de argumentos num\u00e9ricos y LONGBLOB, que no son correctamente manipulados cuando el resultado de la funci\u00f3n es procesado utilizando una tabla temporal intermedia."
    }
  ],
  "id": "CVE-2010-3838",
  "lastModified": "2024-11-21T01:19:43.537",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-14T19:02:43.560",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=54461"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640858"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64840"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=54461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640858"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64840"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-09-11 01:13
Modified
2024-11-21 00:50
Severity ?
Summary
MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b'' (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=35658
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
cve@mitre.orghttp://secunia.com/advisories/31769Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/32759Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/32769
cve@mitre.orghttp://secunia.com/advisories/34907Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/36566
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1783Patch
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2009:094
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/09/09/4
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/09/09/7
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2009-1067.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2009-1289.html
cve@mitre.orghttp://www.securitytracker.com/id?1020858
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-671-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2554Vendor Advisory
cve@mitre.orghttps://bugs.gentoo.org/237166
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/45042
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=35658
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31769Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32759Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32769
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34907Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36566
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1783Patch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:094
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/09/09/4
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/09/09/7
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1067.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1289.html
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020858
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-671-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2554Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugs.gentoo.org/237166
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/45042
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521
Impacted products
Vendor Product Version
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.1.5
mysql mysql 5.1.23
oracle mysql 5.0.0
oracle mysql 5.0.6
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.33
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 6.0.0
oracle mysql 6.0.1
oracle mysql 6.0.2
oracle mysql 6.0.3
oracle mysql 6.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F48E7355-2D9A-454D-AE66-B0AE015E31A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E51BF67A-BAEC-48F8-9290-67C6C5B8442E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5C6A2F-DEAE-470D-8888-0E9076CCA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C09231E-8759-4DFB-AA8D-17A1C6D43AC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "81592813-78D9-4366-AD2E-94677D93F599",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b\u0027\u0027 (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement."
    },
    {
      "lang": "es",
      "value": "MySQL versiones 5.0 anteriores a 5.0.66, versiones 5.1 anteriores a 5.1.26 y versiones 6.0 anteriores a 6.0.6, no maneja apropiadamente un token b\u0027\u0027 (b comilla simple comilla simple), tambi\u00e9n se conoce como literal de cadena de bits vac\u00eda, que permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio) mediante el uso de este token en una sentencia SQL."
    }
  ],
  "id": "CVE-2008-3963",
  "lastModified": "2024-11-21T00:50:35.183",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-09-11T01:13:47.617",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=35658"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31769"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32759"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/32769"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34907"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/36566"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1783"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/09/09/4"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/09/09/7"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020858"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-671-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2554"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.gentoo.org/237166"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=35658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31769"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32759"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32769"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34907"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36566"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1783"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/09/09/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/09/09/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020858"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-671-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2554"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugs.gentoo.org/237166"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "This issue did not affect MySQL as supplied with Red Hat Enterprise Linux 3 or 4.\n\nThis issue was addressed for Red Hat Enterprise Linux 5 and Red Hat Application Stack v2\nhttps://rhn.redhat.com/cve/CVE-2008-3963.html",
      "lastModified": "2009-09-02T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-03-28 23:55
Modified
2024-11-21 01:49
Severity ?
Summary
Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.1.62
oracle mysql 5.1.63
oracle mysql 5.1.64
oracle mysql 5.1.65
oracle mysql 5.1.66
oracle mysql 5.1.67
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21
oracle mysql 5.5.22
oracle mysql 5.5.23
oracle mysql 5.5.24
oracle mysql 5.5.25
oracle mysql 5.5.25
oracle mysql 5.5.26
oracle mysql 5.5.27
oracle mysql 5.5.28
oracle mysql 5.5.29



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF9060C-9469-48DA-858A-BB42E77AF88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E268D9E-0C18-4257-8820-634B7357BEE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "0942892C-2106-4F1F-AEBE-78C1CF55E363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE6C87CE-8BA5-4701-B295-7672AF52E6B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EABA08A-81F1-46ED-BF57-FA63229DDCE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FD6AA9F-7F35-4522-B396-C2179ED9B490",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "54047553-C08F-474C-8650-89AAAC68056B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "41EE02F4-02F7-49A3-AFCA-C20BA2AF65C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "97045EB4-F22C-4694-BFB2-C1EA72705206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "88DC6246-988E-4259-8BAF-4F104ED12936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:*",
              "matchCriteriaId": "C34D221E-E9D9-4A1D-B3BC-CB66456D004B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF95406-DAA6-4164-95CE-F88F19C8DE24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "65EF36A4-EC77-46FA-B9E9-24B8DBC71BE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D9F2E70-A2F5-432F-A04C-B5811C1A23E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F018DB-4AC3-4FF4-8B9B-1107F81C25F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en yaSSL, como se usa en MySQL v5.1.x hasta 5.1.68 y en v5.5.x antes de v5.5.30, tiene un impacto no especificado y vectores de ataque, una vulnerabilidad diferente a CVE-2012-0553."
    }
  ],
  "id": "CVE-2013-1492",
  "lastModified": "2024-11-21T01:49:43.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-03-28T23:55:01.663",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/52445"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/52445"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-08-16 04:00
Modified
2024-11-20 23:59
Severity ?
Summary
The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\) character.
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.3
mysql mysql 4.1.10
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.18
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.24
oracle mysql 4.1.0
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5
oracle mysql 5.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\\) character."
    }
  ],
  "id": "CVE-2005-2573",
  "lastModified": "2024-11-20T23:59:52.303",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-16T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112360618320729\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21738"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112360618320729\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21738"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-03-05 02:30
Modified
2024-11-21 01:00
Severity ?
Summary
sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via "an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML()," which triggers an assertion failure.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=42495Patch, Vendor Advisory
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.htmlVendor Advisory
cve@mitre.orghttp://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html
cve@mitre.orghttp://secunia.com/advisories/34115Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/33972Exploit
cve@mitre.orghttp://www.securitytracker.com/id?1021786
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/0594Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/49050
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=42495Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34115Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/33972Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021786
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0594Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49050
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544
Impacted products
Vendor Product Version
mysql mysql *
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 6.0.9
mysql mysql 6.0.10-bzr
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 6.0.0
oracle mysql 6.0.1
oracle mysql 6.0.2
oracle mysql 6.0.3
oracle mysql 6.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE37831-9813-4488-AD83-A23DD5729EA9",
              "versionEndIncluding": "5.1.32-bzr",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:6.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E9E9D88-6640-45E8-83AA-7B9C0936D905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:6.0.10-bzr:*:*:*:*:*:*:*",
              "matchCriteriaId": "4433A47E-0AF5-474B-8C68-E6B470CEBC16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F48E7355-2D9A-454D-AE66-B0AE015E31A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E51BF67A-BAEC-48F8-9290-67C6C5B8442E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5C6A2F-DEAE-470D-8888-0E9076CCA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C09231E-8759-4DFB-AA8D-17A1C6D43AC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "81592813-78D9-4366-AD2E-94677D93F599",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" which triggers an assertion failure."
    },
    {
      "lang": "es",
      "value": "El archivo sql/item_xmlfunc.cc en MySQL versiones 5.1 anteriores a 5.1.32 y versiones 6.0 anteriores a 6.0.10, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo) por medio de \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" que desencadena un fallo de aserci\u00f3n."
    }
  ],
  "id": "CVE-2009-0819",
  "lastModified": "2024-11-21T01:00:59.043",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-05T02:30:00.657",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=42495"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34115"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/33972"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1021786"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0594"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=42495"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/33972"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021786"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0594"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect the versions of mysql packages, as shipped with Red Hat Enterprise Linux 3, 4, or 5, and Red Hat Application Stack v2.",
      "lastModified": "2009-10-21T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-14 19:02
Modified
2024-11-21 01:19
Severity ?
Summary
MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=54568Patch
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
cve@mitre.orghttp://secunia.com/advisories/42875Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42936
cve@mitre.orghttp://support.apple.com/kb/HT4723
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2143
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:222
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:223
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0825.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/43676
cve@mitre.orghttp://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0105
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0345
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=640845Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64842
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=54568Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42875Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4723
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2143
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:222
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:223
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0825.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/43676
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0105
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0345
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=640845Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64842
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.45b
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.27
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers."
    },
    {
      "lang": "es",
      "value": "MySQL v5.0 antes de v5.0.92, v5.1 antes de v5.1.51, y v5.5 antes de v5.5.6 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (por un error de aserci\u00f3n y consiguiente ca\u00edda del servidor) a trav\u00e9s de vectores relacionados con la preparaci\u00f3n de una vista, pre-evaluaci\u00f3n de predicados LIKE, y Optimizadores IN."
    }
  ],
  "id": "CVE-2010-3836",
  "lastModified": "2024-11-21T01:19:43.187",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-14T19:02:43.187",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=54568"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640845"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=54568"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640845"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64842"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:35
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors.
References
secalert_us@oracle.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
secalert_us@oracle.comhttp://osvdb.org/78388
secalert_us@oracle.comhttp://secunia.com/advisories/48250
secalert_us@oracle.comhttp://secunia.com/advisories/53372
secalert_us@oracle.comhttp://security.gentoo.org/glsa/glsa-201308-06.xml
secalert_us@oracle.comhttp://www.debian.org/security/2012/dsa-2429
secalert_us@oracle.comhttp://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
secalert_us@oracle.comhttp://www.securityfocus.com/bid/51524
secalert_us@oracle.comhttp://www.ubuntu.com/usn/USN-1397-1
secalert_us@oracle.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/72531
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/78388
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48250
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/53372
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201308-06.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2429
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/51524
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/72531
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.45
mysql mysql 5.0.45b
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91
oracle mysql 5.0.92
oracle mysql 5.0.93
oracle mysql 5.0.94



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*",
              "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en componente MySQL Server de Oracle MySQL v5.0.x, v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2012-0490",
  "lastModified": "2024-11-21T01:35:06.053",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:07.430",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://osvdb.org/78388"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securityfocus.com/bid/51524"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72531"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/78388"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51524"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72531"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-11-03 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=3270Exploit, Vendor Advisory
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892Broken Link
cve@mitre.orghttp://lists.mysql.com/internals/13073Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/12783/Patch, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1011606Third Party Advisory, VDB Entry
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1Broken Link
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/p-018.shtmlBroken Link
cve@mitre.orghttp://www.debian.org/security/2004/dsa-562Patch, Third Party Advisory
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200410-22.xmlPatch, Vendor Advisory
cve@mitre.orghttp://www.mysql.org/doc/refman/4.1/en/news-4-0-19.htmlVendor Advisory
cve@mitre.orghttp://www.mysql.org/doc/refman/4.1/en/news-4-1-2.htmlVendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-597.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-611.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/11357Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
cve@mitre.orghttp://www.trustix.org/errata/2004/0054/Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17666Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=3270Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892Broken Link
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/internals/13073Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/12783/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1011606Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/p-018.shtmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-562Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200410-22.xmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-597.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-611.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11357Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2004/0054/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17666Third Party Advisory, VDB Entry
Impacted products
Vendor Product Version
mysql mysql *
mysql mysql *
oracle mysql *
oracle mysql *
debian debian_linux 3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "823AD411-0A49-4EAA-AABF-C8705CE18AF9",
              "versionEndIncluding": "4.1.2",
              "versionStartIncluding": "4.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA5A3321-CF65-4B5E-90E3-DAC9CFD19BB3",
              "versionEndIncluding": "5.0.1",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7882B594-DC91-4F85-A450-9F43872F3BC7",
              "versionEndExcluding": "3.23.59",
              "versionStartExcluding": "3.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "373C3F5C-56D1-4DDA-A8C4-E2DC3E164B44",
              "versionEndExcluding": "4.0.19",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities."
    },
    {
      "lang": "es",
      "value": "MySQL 4 anteriores a 4.0.21 y 3.x anteriores a 3.23.49 comprueban los derechos CREATE/INSERT de la tabla original en lugar de los de la tabla de destino en una operaci\u00f3n ALTER TABLE RANAME, lo que podr\u00eda permitir a atacantes realizar actividades no permitidas."
    }
  ],
  "id": "CVE-2004-0835",
  "lastModified": "2024-11-20T23:49:31.617",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-11-03T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=3270"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.mysql.com/internals/13073"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/12783/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1011606"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-562"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Third Party Advisory",
        "VDB Entry",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11357"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.trustix.org/errata/2004/0054/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17666"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=3270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.mysql.com/internals/13073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/12783/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1011606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-562"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Third Party Advisory",
        "VDB Entry",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11357"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.trustix.org/errata/2004/0054/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17666"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-17 00:55
Modified
2024-11-21 01:11
Severity ?
Summary
The executable comment feature in MySQL 5.0.x before 5.0.93 and 5.1.x before 5.1.50, when running in certain slave configurations in which the slave is running a newer version than the master, allows remote attackers to execute arbitrary SQL commands via custom comments.
Impacted products
Vendor Product Version
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.24
mysql mysql 5.0.45
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.23
oracle mysql 5.0.41
oracle mysql 5.0.45
oracle mysql 5.0.51
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91
oracle mysql 5.0.92
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*",
              "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The executable comment feature in MySQL 5.0.x before 5.0.93 and 5.1.x before 5.1.50, when running in certain slave configurations in which the slave is running a newer version than the master, allows remote attackers to execute arbitrary SQL commands via custom comments."
    },
    {
      "lang": "es",
      "value": "La caracter\u00edstica de comentarios ejecutables en MySQL v5.0.x antes de v5.0.93 y v5.1.x antes de v5.1.50, cuando se ejecuta con ciertas configuraciones de esclavos en la que el esclavo est\u00e1 ejecutando una versi\u00f3n m\u00e1s reciente que el maestro, permite a atacantes remotos ejecutar comandos SQL a trav\u00e9s de comentarios personalizados.\r\n"
    }
  ],
  "id": "CVE-2009-5026",
  "lastModified": "2024-11-21T01:11:01.083",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-17T00:55:01.470",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=49124"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/oss-sec/2011/q4/101"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/49179"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=49124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/oss-sec/2011/q4/101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640177"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-14 19:02
Modified
2024-11-21 01:19
Severity ?
Summary
MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=53544
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
cve@mitre.orghttp://secunia.com/advisories/42936
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:222
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:223
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0825.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/43676
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=640861
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64839
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=53544
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:222
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:223
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0825.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/43676
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=640861
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64839
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements."
    },
    {
      "lang": "es",
      "value": "MySQL v5.1 antes de v5.1.51 y v5.5 antes de v5.5.6 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (por un bucle infinito) a trav\u00e9s de varias invocaciones de (1) un procedimiento preparado o (2) un procedimiento almacenado que crea una consulta con JOINs anidados ."
    }
  ],
  "id": "CVE-2010-3839",
  "lastModified": "2024-11-21T01:19:43.700",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-14T19:02:44.280",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=53544"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640861"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=53544"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640861"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64839"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-12-10 21:46
Modified
2024-11-21 00:39
Severity ?
Summary
The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=29801Exploit
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html
cve@mitre.orghttp://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html
cve@mitre.orghttp://lists.mysql.com/announce/502
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
cve@mitre.orghttp://osvdb.org/42609
cve@mitre.orghttp://secunia.com/advisories/28063Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28128Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28343Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28637Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28739Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28838Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29706Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-04.xml
cve@mitre.orghttp://securitytracker.com/id?1019085
cve@mitre.orghttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1451
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:017
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:028
cve@mitre.orghttp://www.securityfocus.com/archive/1/487606/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/26832
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/4198Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/38990
cve@mitre.orghttps://issues.rpath.com/browse/RPL-2187
cve@mitre.orghttps://usn.ubuntu.com/559-1/
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=29801Exploit
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/announce/502
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/42609
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28063Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28128Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28343Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28637Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28739Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28838Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29706Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-04.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1019085
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1451
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:017
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:028
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/487606/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26832
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4198Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/38990
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2187
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/559-1/
Impacted products
Vendor Product Version
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.27
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.0.41
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 6.0.0
oracle mysql 6.0.1
oracle mysql 6.0.2
oracle mysql 6.0.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F48E7355-2D9A-454D-AE66-B0AE015E31A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E51BF67A-BAEC-48F8-9290-67C6C5B8442E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5C6A2F-DEAE-470D-8888-0E9076CCA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C09231E-8759-4DFB-AA8D-17A1C6D43AC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns."
    },
    {
      "lang": "es",
      "value": "El motor federated en MySQL versiones 5.0.x anteriores a 5.0.51a, versiones 5.1.x anteriores a 5.1.23 y versiones 6.0.x anteriores a 6.0.4, al realizar una determinada consulta SHOW TABLE STATUS, permite a los servidores MySQL remotos causar una denegaci\u00f3n de servicio (bloqueo del manejador de federated y bloqueo del demonio) por medio de una respuesta que carece del n\u00famero m\u00ednimo necesario de columnas."
    }
  ],
  "id": "CVE-2007-6304",
  "lastModified": "2024-11-21T00:39:49.363",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-12-10T21:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=29801"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.mysql.com/announce/502"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42609"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28063"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28128"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28343"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28637"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28739"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28838"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29706"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1019085"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1451"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/26832"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4198"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38990"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-2187"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/559-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=29801"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.mysql.com/announce/502"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42609"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28063"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28128"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28343"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28739"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28838"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1019085"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1451"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26832"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4198"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38990"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2187"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/559-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. The MySQL versions as shipped in Red Hat Enterprise Linux 2.1, 3, and 4 do not support federated storage engine. The MySQL package as shipped in Red Hat Enterprise Linux 5, Red Hat Application Stack v1, and Red Hat Application Stack v2 are not compiled with support for federated storage engine.",
      "lastModified": "2007-12-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:34
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102.
References
secalert_us@oracle.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
secalert_us@oracle.comhttp://osvdb.org/78378
secalert_us@oracle.comhttp://secunia.com/advisories/48250
secalert_us@oracle.comhttp://secunia.com/advisories/53372
secalert_us@oracle.comhttp://security.gentoo.org/glsa/glsa-201308-06.xml
secalert_us@oracle.comhttp://www.debian.org/security/2012/dsa-2429
secalert_us@oracle.comhttp://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
secalert_us@oracle.comhttp://www.ubuntu.com/usn/USN-1397-1
secalert_us@oracle.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/72520
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/78378
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48250
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/53372
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201308-06.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2429
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/72520
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.0.30
mysql mysql 5.0.36
mysql mysql 5.0.44
mysql mysql 5.0.45
mysql mysql 5.0.45b
mysql mysql 5.0.54
mysql mysql 5.0.56
mysql mysql 5.0.60
mysql mysql 5.0.66
mysql mysql 5.0.82
mysql mysql 5.0.84
mysql mysql 5.0.87
oracle mysql 5.0.23
oracle mysql 5.0.25
oracle mysql 5.0.26
oracle mysql 5.0.30
oracle mysql 5.0.32
oracle mysql 5.0.38
oracle mysql 5.0.41
oracle mysql 5.0.42
oracle mysql 5.0.45
oracle mysql 5.0.50
oracle mysql 5.0.51
oracle mysql 5.0.52
oracle mysql 5.0.67
oracle mysql 5.0.75
oracle mysql 5.0.77
oracle mysql 5.0.81
oracle mysql 5.0.83
oracle mysql 5.0.85
oracle mysql 5.0.86
oracle mysql 5.0.88
oracle mysql 5.0.89
oracle mysql 5.0.90
oracle mysql 5.0.91
oracle mysql 5.0.92
oracle mysql 5.0.93
oracle mysql 5.0.94



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*",
              "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.0.x y v5.1.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a la de los CVEs: CVE-2012-0087 y CVE-2012-0102."
    }
  ],
  "id": "CVE-2012-0101",
  "lastModified": "2024-11-21T01:34:23.453",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:05.990",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://osvdb.org/78378"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/78378"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72520"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-18 22:55
Modified
2024-11-21 01:34
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.19
oracle mysql 5.5.20
oracle mysql 5.5.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a las de los CVEs: CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485 y CVE-2012-0492."
    }
  ],
  "id": "CVE-2012-0120",
  "lastModified": "2024-11-21T01:34:25.700",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-18T22:55:06.990",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-06-19 18:02
Modified
2024-11-21 00:12
Severity ?
Summary
mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=15828
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=305214
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
cve@mitre.orghttp://seclists.org/lists/fulldisclosure/2006/Jun/0434.html
cve@mitre.orghttp://secunia.com/advisories/19929Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20832Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20871Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/24479
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1112
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:111
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0083.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/437145
cve@mitre.orghttp://www.securityfocus.com/archive/1/437277
cve@mitre.orghttp://www.securityfocus.com/archive/1/437571/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/18439Exploit
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA06-208A.htmlUS Government Resource
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/0930
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/27212
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516
cve@mitre.orghttps://usn.ubuntu.com/306-1/
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=15828
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=305214
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19929Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20832Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20871Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24479
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1112
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:111
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0083.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/437145
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/437277
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/437571/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/18439Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA06-208A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0930
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/27212
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/306-1/
Impacted products
Vendor Product Version
mysql mysql 4.1.13
mysql mysql 4.1.15
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.1.5
oracle mysql 4.0.18
oracle mysql 4.1.4
oracle mysql 4.1.5
oracle mysql 4.1.7
oracle mysql 4.1.16
oracle mysql 5.0.18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function."
    },
    {
      "lang": "es",
      "value": "mysqld en MySQL v4.1.x antes de v4.1.18, v5.0.x antes de v5.0.19, y v5.1.x antes de v5.1.6 permite causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a usuarios remotos autorizados a trav\u00e9s de un segundo argumento nulo para la funci\u00f3n STR_TO_DATE."
    }
  ],
  "id": "CVE-2006-3081",
  "lastModified": "2024-11-21T00:12:46.580",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-06-19T18:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=15828"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19929"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20832"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20871"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1112"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/437145"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/437277"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/18439"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/306-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=15828"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=305214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19929"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20832"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20871"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/437145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/437277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/18439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/306-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-14 19:02
Modified
2024-11-21 01:19
Severity ?
Summary
The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=51875Patch
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
cve@mitre.orghttp://lists.mysql.com/commits/117094Patch
cve@mitre.orghttp://secunia.com/advisories/42875Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42936Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2143
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:222
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:223
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0824.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0825.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0164.html
cve@mitre.orghttp://www.securityfocus.com/bid/43676
cve@mitre.orghttp://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1017-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1397-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0105Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0170Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0345Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=640865Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64838
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=51875Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/commits/117094Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42875Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42936Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2143
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:222
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:223
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0824.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0825.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0164.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/43676
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1017-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1397-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0105Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0170Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0345Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=640865Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64838
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n Gis_line_string::init_from_wkb en el archivo sql/spatial.cc en MySQL versiones 5.1 anteriores a 5.1.51, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del servidor) mediante el llamado a la funci\u00f3n PolyFromWKB con datos Well-Known Binary (WKB) que contienen un n\u00famero especialmente dise\u00f1ado de (1) cadenas de l\u00ednea o (2) puntos de l\u00ednea."
    }
  ],
  "id": "CVE-2010-3840",
  "lastModified": "2024-11-21T01:19:43.857",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-14T19:02:44.797",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=51875"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.mysql.com/commits/117094"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640865"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64838"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=51875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.mysql.com/commits/117094"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43676"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1017-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1397-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640865"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64838"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-11 20:00
Modified
2024-11-21 01:19
Severity ?
Summary
storage/innobase/dict/dict0crea.c in mysqld in Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (assertion failure) by modifying the (1) innodb_file_format or (2) innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement.
Impacted products
Vendor Product Version
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "storage/innobase/dict/dict0crea.c in mysqld in Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (assertion failure) by modifying the (1) innodb_file_format or (2) innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement."
    },
    {
      "lang": "es",
      "value": "El archivo storage/innobase/dict/dict0crea.c en mysqld en MySQL de Oracle versiones 5.1 anteriores a 5.1.49, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n) mediante la modificaci\u00f3n de la configuraci\u00f3n de los par\u00e1metros (1) innodb_file_format o (2) innodb_file_per_table por el motor de almacenamiento InnoDB y, a continuaci\u00f3n, ejecutar una declaraci\u00f3n DDL."
    }
  ],
  "id": "CVE-2010-3676",
  "lastModified": "2024-11-21T01:19:21.947",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-11T20:00:01.260",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=55039"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/42643"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628660"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64689"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.mysql.com/bug.php?id=55039"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42643"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628660"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64689"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-16 01:19
Modified
2024-11-21 00:31
Severity ?
Summary
The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges.
References
cve@mitre.orghttp://bugs.mysql.com/bug.php?id=27337
cve@mitre.orghttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html
cve@mitre.orghttp://lists.mysql.com/announce/470
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
cve@mitre.orghttp://osvdb.org/34765
cve@mitre.orghttp://secunia.com/advisories/25301Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26073
cve@mitre.orghttp://secunia.com/advisories/26430
cve@mitre.orghttp://secunia.com/advisories/27823
cve@mitre.orghttp://secunia.com/advisories/28637
cve@mitre.orghttp://secunia.com/advisories/28838
cve@mitre.orghttp://secunia.com/advisories/29443
cve@mitre.orghttp://secunia.com/advisories/30351
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1413
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:028
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0894.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0364.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/473874/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/24011
cve@mitre.orghttp://www.securitytracker.com/id?1018070
cve@mitre.orghttp://www.ubuntu.com/usn/usn-588-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1804
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/34348
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1536
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166
af854a3a-2127-422b-91ae-364da2661108http://bugs.mysql.com/bug.php?id=27337
af854a3a-2127-422b-91ae-364da2661108http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mysql.com/announce/470
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/34765
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25301Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26073
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26430
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27823
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28637
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28838
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29443
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30351
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1413
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:028
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0894.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0364.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/473874/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24011
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018070
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-588-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1804
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/34348
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1536
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166
Impacted products
Vendor Product Version
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.5.0.21
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.22.1.0.1
mysql mysql 5.0.24
mysql mysql 5.1.5
oracle mysql 5.0.0
oracle mysql 5.0.3
oracle mysql 5.0.6
oracle mysql 5.0.7
oracle mysql 5.0.8
oracle mysql 5.0.9
oracle mysql 5.0.11
oracle mysql 5.0.12
oracle mysql 5.0.13
oracle mysql 5.0.14
oracle mysql 5.0.18
oracle mysql 5.0.19
oracle mysql 5.0.21
oracle mysql 5.0.22
oracle mysql 5.0.27
oracle mysql 5.0.33
oracle mysql 5.0.37
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n mysql_change_db en MySQL 5.0.x anterior a 5.0.40 y 5.1.x anterior a 5.1.18 no restaura los privilegios THD::db_access cuando regresa de rutinas almacenadas SQL SECURITY INVOKER, lo cual permite a usuarios autenticados remotamente obtener privilegios."
    }
  ],
  "id": "CVE-2007-2692",
  "lastModified": "2024-11-21T00:31:25.393",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-16T01:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/bug.php?id=27337"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.mysql.com/announce/470"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/34765"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25301"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26073"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26430"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27823"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28637"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28838"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29443"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1413"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24011"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018070"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-588-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1804"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34348"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1536"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/bug.php?id=27337"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.mysql.com/announce/470"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/34765"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25301"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26430"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28838"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29443"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018070"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-588-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1804"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34348"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1536"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "This issue did not affect mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3 and 4.\n\nAffected mysql packages as shipped in Red Hat Enterprise Linux 5 and Red Hat Application Stack were fixed via:\n\nhttps://rhn.redhat.com/errata/CVE-2007-2692.html",
      "lastModified": "2008-07-25T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2024-11-20 23:47
Severity ?
Summary
MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods.
Impacted products
Vendor Product Version
mysql mysql 4.1.0
oracle mysql 3.20
oracle mysql 3.20.32a
oracle mysql 3.21
oracle mysql 3.22
oracle mysql 3.22.26
oracle mysql 3.22.27
oracle mysql 3.22.28
oracle mysql 3.22.29
oracle mysql 3.22.30
oracle mysql 3.22.32
oracle mysql 3.23.2
oracle mysql 3.23.3
oracle mysql 3.23.4
oracle mysql 3.23.5
oracle mysql 3.23.8
oracle mysql 3.23.9
oracle mysql 3.23.10
oracle mysql 3.23.22
oracle mysql 3.23.23
oracle mysql 3.23.24
oracle mysql 3.23.25
oracle mysql 3.23.26
oracle mysql 3.23.27
oracle mysql 3.23.28
oracle mysql 3.23.28
oracle mysql 3.23.29
oracle mysql 3.23.30
oracle mysql 3.23.31
oracle mysql 3.23.32
oracle mysql 3.23.33
oracle mysql 3.23.34
oracle mysql 3.23.35
oracle mysql 3.23.36
oracle mysql 3.23.37
oracle mysql 3.23.38
oracle mysql 3.23.39
oracle mysql 3.23.40
oracle mysql 3.23.41
oracle mysql 3.23.42
oracle mysql 3.23.43
oracle mysql 3.23.44
oracle mysql 3.23.45
oracle mysql 3.23.46
oracle mysql 3.23.47
oracle mysql 3.23.48
oracle mysql 3.23.49
oracle mysql 3.23.50
oracle mysql 3.23.51
oracle mysql 3.23.52
oracle mysql 3.23.53
oracle mysql 3.23.53a
oracle mysql 3.23.54
oracle mysql 3.23.54a
oracle mysql 3.23.55
oracle mysql 3.23.56
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.5a
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.11
oracle mysql 4.1.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "578BA199-EF04-4595-AFDE-54FD66B7FC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.20.32a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B270BC3E-FCB8-4E85-A069-A6AA3D348E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82E464F-3871-40C7-A758-B81582D193AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "05B7E2C5-6139-47F9-A310-F2BC0EF83942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "C883DB55-0CAC-462A-912B-69E9E7E1C79C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "45AD5549-07DC-43DA-B277-D7BF16ABE4E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "787CB28C-74C6-4356-8AB3-4183CD941EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30459B9-0FAC-48DF-9601-AAD1A028846F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "86DC48D3-09F1-48BD-A783-0549D4D5E8B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "209E0C63-FC71-4E19-B3D5-BCB71A758252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "77B463E6-DAD6-4013-8095-F0153F8B335F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EFB2D10-E255-4DD3-BF03-217803CDED24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods."
    }
  ],
  "id": "CVE-2003-1480",
  "lastModified": "2024-11-20T23:47:15.477",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/8753"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securiteam.com/tools/5WP031FA0U.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/7500"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/8753"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securiteam.com/tools/5WP031FA0U.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/7500"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

var-200801-0204
Vulnerability from variot

Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp. yaSSL is prone to multiple remote buffer-overflow vulnerabilities. Failed attacks will cause denial-of-service conditions. yaSSL 1.7.5 is vulnerable to these issues; other versions are also likely to be affected. # MySQL yaSSL SSL Hello Message Buffer Overflow 1. Vulnerability introduction and analysis yaSSL is an open source software package used to implement SSL. There are multiple remote overflow and invalid memory access issues in the yaSSL implementation, and remote attackers may take advantage of this vulnerability to control the server. The yaSSL (1.7.5 and earlier) implementation to Stack Buffer Overflow is bundled with MySQL <= 6.0. Code analysis: The buffer structure used to contain the data in the Hello message received by the client is as follows (from yassl_imp.hpp): class ClientHello : public HandShakeBase { ProtocolVersion client_version_; Random random_; uint8 id_len_; // session id length opaque session_id_[ID_LEN]; uint16 suite_len_; // cipher suite length opaque cipher_suites_[MAX_SUITE_SZ]; uint8 comp_len_; // compression length CompressionMethod compression_methods_; ... Here ID_LEN length is 32 units, MAX_SUITE_SZ is 64, RAN_LEN (RANd_LEN) 32. If an old version of the Hello message is received, the called ProcessOldClientHello function does not perform the necessary checks to limit the amount of data filling the above three fields, resulting in a buffer overflow vulnerability. The following is the vulnerable code in handshake.cpp: void ProcessOldClientHello(input_buffer& input, SSL& ssl) ... ClientHello ch; ... for (uint16 i = 0; i < ch.

Sergei Golubchik found that MySQL did not properly validate optional data or index directory paths given in a CREATE TABLE statement; as well it would not, under certain conditions, prevent two databases from using the same paths for data or index files. This could allow an authenticated user with appropriate privilege to create tables in one database to read and manipulate data in tables later created in other databases, regardless of GRANT privileges (CVE-2008-2079).

The updated packages have been patched to correct these issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0226 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0227 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079


Updated Packages:

Mandriva Linux 2007.1: 56e59e5a7413ca900767afa20480fff5 2007.1/i586/libmysql15-5.0.45-8.2mdv2007.1.i586.rpm c11348f9b60a3fb153cf07a7b2e22502 2007.1/i586/libmysql-devel-5.0.45-8.2mdv2007.1.i586.rpm a60fca42161427ed528a6a1fd58c61e3 2007.1/i586/libmysql-static-devel-5.0.45-8.2mdv2007.1.i586.rpm a6c4108497edb6cd0d7f723ca5f81c1f 2007.1/i586/mysql-5.0.45-8.2mdv2007.1.i586.rpm 62b091bfed614ed2be0e9f1dabc00e6e 2007.1/i586/mysql-bench-5.0.45-8.2mdv2007.1.i586.rpm 65c4cbcbaa11ad0fd5521ff9821a0e71 2007.1/i586/mysql-client-5.0.45-8.2mdv2007.1.i586.rpm 6cafb4fc0190c3d8c301737cc1b2d584 2007.1/i586/mysql-common-5.0.45-8.2mdv2007.1.i586.rpm ab7ff6bc5ed1e3add97e87eadffdf7d0 2007.1/i586/mysql-max-5.0.45-8.2mdv2007.1.i586.rpm 0c0d3817061fed8a9495b976e9aad4f6 2007.1/i586/mysql-ndb-extra-5.0.45-8.2mdv2007.1.i586.rpm e180f9184b397c76f121fa2cbcc249ee 2007.1/i586/mysql-ndb-management-5.0.45-8.2mdv2007.1.i586.rpm 11f6b6b340ec050489117a31ba1ada7b 2007.1/i586/mysql-ndb-storage-5.0.45-8.2mdv2007.1.i586.rpm 27d5c830d808a9198b5a3234ab635c31 2007.1/i586/mysql-ndb-tools-5.0.45-8.2mdv2007.1.i586.rpm 0b18a06428b4c5351ea19433a18ba44b 2007.1/SRPMS/mysql-5.0.45-8.2mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64: 861ae8a12d105c0537345f4b1b6364a6 2007.1/x86_64/lib64mysql15-5.0.45-8.2mdv2007.1.x86_64.rpm 74995c774432f4acacf682d14b738bae 2007.1/x86_64/lib64mysql-devel-5.0.45-8.2mdv2007.1.x86_64.rpm 5453d884b0edf40606bd78e62aef8101 2007.1/x86_64/lib64mysql-static-devel-5.0.45-8.2mdv2007.1.x86_64.rpm ef7ab96c6a492dad1a5f1463eaf5568b 2007.1/x86_64/mysql-5.0.45-8.2mdv2007.1.x86_64.rpm e6527ea8482a7928095a2d1d24953ad6 2007.1/x86_64/mysql-bench-5.0.45-8.2mdv2007.1.x86_64.rpm 896ed2418af55577669d67b2b110fded 2007.1/x86_64/mysql-client-5.0.45-8.2mdv2007.1.x86_64.rpm 9cfc765f29d39220862dd8b38a7baddb 2007.1/x86_64/mysql-common-5.0.45-8.2mdv2007.1.x86_64.rpm f738941dbf2fb982e5f91ad1f5b8dd99 2007.1/x86_64/mysql-max-5.0.45-8.2mdv2007.1.x86_64.rpm 604b3cda2222cc031819c1a76f64974e 2007.1/x86_64/mysql-ndb-extra-5.0.45-8.2mdv2007.1.x86_64.rpm 944f87e17f3a30a41392b57005b3866d 2007.1/x86_64/mysql-ndb-management-5.0.45-8.2mdv2007.1.x86_64.rpm abe714a023e8019dc2379f38a10287c6 2007.1/x86_64/mysql-ndb-storage-5.0.45-8.2mdv2007.1.x86_64.rpm 60585f5c00ea687c710da9bf8dc620b0 2007.1/x86_64/mysql-ndb-tools-5.0.45-8.2mdv2007.1.x86_64.rpm 0b18a06428b4c5351ea19433a18ba44b 2007.1/SRPMS/mysql-5.0.45-8.2mdv2007.1.src.rpm

Mandriva Linux 2008.0: 32915a44b313f9752d53864929acacef 2008.0/i586/libmysql15-5.0.45-8.2mdv2008.0.i586.rpm 886f68f93c90d168f0f376f2bdf19dfe 2008.0/i586/libmysql-devel-5.0.45-8.2mdv2008.0.i586.rpm 05d52109e0e751d6ecb330361f0c49b1 2008.0/i586/libmysql-static-devel-5.0.45-8.2mdv2008.0.i586.rpm c2d269602985c48dbfaa56edbb2089a5 2008.0/i586/mysql-5.0.45-8.2mdv2008.0.i586.rpm fe5a49a0dbcf5b5b862fa15c697ec734 2008.0/i586/mysql-bench-5.0.45-8.2mdv2008.0.i586.rpm 5d9e574e07b13db1e98ac5084ef24c52 2008.0/i586/mysql-client-5.0.45-8.2mdv2008.0.i586.rpm c3a73f6ba9467995e4eeeb2994987e8c 2008.0/i586/mysql-common-5.0.45-8.2mdv2008.0.i586.rpm faca35a011bd9e95c3aded56c498efe7 2008.0/i586/mysql-max-5.0.45-8.2mdv2008.0.i586.rpm ae5bece63ecfacd37582c68288e146a6 2008.0/i586/mysql-ndb-extra-5.0.45-8.2mdv2008.0.i586.rpm 6948d8799ff1e8e9ae3908dcfdfafc2a 2008.0/i586/mysql-ndb-management-5.0.45-8.2mdv2008.0.i586.rpm 11566a84793e2eb8b2e55fe28d89b918 2008.0/i586/mysql-ndb-storage-5.0.45-8.2mdv2008.0.i586.rpm 7e8e44013f0de7b0cd2c527da9202985 2008.0/i586/mysql-ndb-tools-5.0.45-8.2mdv2008.0.i586.rpm af4075fd835e0372f1f6745f2f6f2d24 2008.0/SRPMS/mysql-5.0.45-8.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64: c3683e4b578bcf573913d2c8ea3bcc64 2008.0/x86_64/lib64mysql15-5.0.45-8.2mdv2008.0.x86_64.rpm a15bc584715bfa86221d021a45610701 2008.0/x86_64/lib64mysql-devel-5.0.45-8.2mdv2008.0.x86_64.rpm 7037c5117e10169e7f0d862cb3916a7d 2008.0/x86_64/lib64mysql-static-devel-5.0.45-8.2mdv2008.0.x86_64.rpm 624b99283d71f7fc372029d188b0d68e 2008.0/x86_64/mysql-5.0.45-8.2mdv2008.0.x86_64.rpm 3efcb2ad37ae4d91f5915548fcebb0fc 2008.0/x86_64/mysql-bench-5.0.45-8.2mdv2008.0.x86_64.rpm 69b7b8e85e21c015d1db4822885f9e70 2008.0/x86_64/mysql-client-5.0.45-8.2mdv2008.0.x86_64.rpm cd9cc2fd720dedef518fed7f6dbcd851 2008.0/x86_64/mysql-common-5.0.45-8.2mdv2008.0.x86_64.rpm dc1da6c335fdbe30762c3bdc8431de71 2008.0/x86_64/mysql-max-5.0.45-8.2mdv2008.0.x86_64.rpm 065d9a2c3515567c0d11a45a44b2b902 2008.0/x86_64/mysql-ndb-extra-5.0.45-8.2mdv2008.0.x86_64.rpm 8fb80d3e1b683af128b77d1ab9e6ad06 2008.0/x86_64/mysql-ndb-management-5.0.45-8.2mdv2008.0.x86_64.rpm 9e4a50fcfb351876e1294bcc113a9d01 2008.0/x86_64/mysql-ndb-storage-5.0.45-8.2mdv2008.0.x86_64.rpm 0788ada6ccdddb7db76ebcf3efbe8e0b 2008.0/x86_64/mysql-ndb-tools-5.0.45-8.2mdv2008.0.x86_64.rpm af4075fd835e0372f1f6745f2f6f2d24 2008.0/SRPMS/mysql-5.0.45-8.2mdv2008.0.src.rpm

Corporate 4.0: 08c68b948479e0609200d3a75fa1e6f8 corporate/4.0/i586/libmysql15-5.0.45-7.2.20060mlcs4.i586.rpm 9559df7a4dd7a7a5cd2f3350d0aaf644 corporate/4.0/i586/libmysql-devel-5.0.45-7.2.20060mlcs4.i586.rpm 7c6b41f3e966a9533fe2e508099e9ac3 corporate/4.0/i586/libmysql-static-devel-5.0.45-7.2.20060mlcs4.i586.rpm 83fc3360f5f3d5e4612e8b2dcccb9d86 corporate/4.0/i586/mysql-5.0.45-7.2.20060mlcs4.i586.rpm 119770dc70f1dec99770b89569d5f244 corporate/4.0/i586/mysql-bench-5.0.45-7.2.20060mlcs4.i586.rpm eaba4a0339945fe1e6f3b2197d43dc6d corporate/4.0/i586/mysql-client-5.0.45-7.2.20060mlcs4.i586.rpm 9d19c37b04c4db67c135ecd277b48d55 corporate/4.0/i586/mysql-common-5.0.45-7.2.20060mlcs4.i586.rpm 29ce0477fee72dd9f76665b7ab3d3733 corporate/4.0/i586/mysql-max-5.0.45-7.2.20060mlcs4.i586.rpm 76ef2d6cedff1526cea6e5391e53bd0b corporate/4.0/i586/mysql-ndb-extra-5.0.45-7.2.20060mlcs4.i586.rpm efd3de6baa6c09f0926e1d71fdcbb7d2 corporate/4.0/i586/mysql-ndb-management-5.0.45-7.2.20060mlcs4.i586.rpm 58acbcf9bd22ae8b686f270959a24d9a corporate/4.0/i586/mysql-ndb-storage-5.0.45-7.2.20060mlcs4.i586.rpm 0679c750bc5dd1f0ad9c26513c9d5a1f corporate/4.0/i586/mysql-ndb-tools-5.0.45-7.2.20060mlcs4.i586.rpm a2744801fe9ed017d4cfb3b40d7dcc42 corporate/4.0/SRPMS/mysql-5.0.45-7.2.20060mlcs4.src.rpm

Corporate 4.0/X86_64: 1540c030207321b12c1dbf6518b259ea corporate/4.0/x86_64/lib64mysql15-5.0.45-7.2.20060mlcs4.x86_64.rpm b8a1daf95d7212f43635d06e709c3318 corporate/4.0/x86_64/lib64mysql-devel-5.0.45-7.2.20060mlcs4.x86_64.rpm 11ff72e78bca0c13e2bbe1d3eba69b6f corporate/4.0/x86_64/lib64mysql-static-devel-5.0.45-7.2.20060mlcs4.x86_64.rpm ec357bc74168b72e716ee47fdc8953ef corporate/4.0/x86_64/mysql-5.0.45-7.2.20060mlcs4.x86_64.rpm 2d4a49b5b2ef6be7f180c37bf6848502 corporate/4.0/x86_64/mysql-bench-5.0.45-7.2.20060mlcs4.x86_64.rpm 5acf56e4dc62af041eeeff90ad32ddbf corporate/4.0/x86_64/mysql-client-5.0.45-7.2.20060mlcs4.x86_64.rpm eadd8f9b5afdadc1e67ab76e63c5ede6 corporate/4.0/x86_64/mysql-common-5.0.45-7.2.20060mlcs4.x86_64.rpm 233bd234e9c9ce5922b9655a6fdd72ce corporate/4.0/x86_64/mysql-max-5.0.45-7.2.20060mlcs4.x86_64.rpm 97494344056c6e4f8340eaf0036ac97f corporate/4.0/x86_64/mysql-ndb-extra-5.0.45-7.2.20060mlcs4.x86_64.rpm ca70ce3ed5c592ec41151b1c6f1d43d8 corporate/4.0/x86_64/mysql-ndb-management-5.0.45-7.2.20060mlcs4.x86_64.rpm 379dab3d7aecfba0b93d5e5691d742db corporate/4.0/x86_64/mysql-ndb-storage-5.0.45-7.2.20060mlcs4.x86_64.rpm e0e9ca0dc122c8657aada9a9db758ca1 corporate/4.0/x86_64/mysql-ndb-tools-5.0.45-7.2.20060mlcs4.x86_64.rpm a2744801fe9ed017d4cfb3b40d7dcc42 corporate/4.0/SRPMS/mysql-5.0.45-7.2.20060mlcs4.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFIgkXmmqjQ0CJFipgRAkLWAKClwPBbIW2SXkcexkEJjW79kexPLQCfRirO wV2/ikre4rdv7NLrZRgofos= =qdV+ -----END PGP SIGNATURE----- .


Bist Du interessiert an einem neuen Job in IT-Sicherheit?

Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/


TITLE: Nucleus XML-RPC PHP Code Execution Vulnerability

SECUNIA ADVISORY ID: SA15895

VERIFY ADVISORY: http://secunia.com/advisories/15895/

CRITICAL: Highly critical

IMPACT: System access

WHERE:

From remote

SOFTWARE: Nucleus 3.x http://secunia.com/product/3699/

DESCRIPTION: A vulnerability has been reported in Nucleus, which can be exploited by malicious people to compromise a vulnerable system. http://sourceforge.net/project/showfiles.php?group_id=66479

OTHER REFERENCES: SA15852: http://secunia.com/advisories/15852/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. =========================================================== Ubuntu Security Notice USN-588-2 April 02, 2008 mysql-dfsg-5.0 regression https://launchpad.net/bugs/209699 ===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 6.06 LTS: mysql-server-5.0 5.0.22-0ubuntu6.06.9

In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

USN-588-1 fixed vulnerabilities in MySQL. In fixing CVE-2007-2692 for Ubuntu 6.06, additional improvements were made to make privilege checks more restictive. As a result, an upstream bug was exposed which could cause operations on tables or views in a different database to fail. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Masaaki Hirose discovered that MySQL could be made to dereference a NULL pointer. An authenticated user could cause a denial of service (application crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table. This issue only affects Ubuntu 6.06 and 6.10. (CVE-2006-7232)

Alexander Nozdrin discovered that MySQL did not restore database access privileges when returning from SQL SECURITY INVOKER stored routines. An authenticated user could exploit this to gain privileges. This issue does not affect Ubuntu 7.10. (CVE-2007-2692)

Martin Friebe discovered that MySQL did not properly update the DEFINER value of an altered view. An authenticated user could use CREATE SQL SECURITY DEFINER VIEW and ALTER VIEW statements to gain privileges. (CVE-2007-6303)

Luigi Auriemma discovered that yaSSL as included in MySQL did not properly validate its input. This issue did not affect Ubuntu 6.06 in the default installation. (CVE-2008-0226, CVE-2008-0227)

Updated packages for Ubuntu 6.06 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.9.diff.gz
  Size/MD5:   155085 f8c7ef90adb69cf67cc6366612b63d48
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.9.dsc
  Size/MD5:     1114 d305551acc1c106afc8fcea708bf7748
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22.orig.tar.gz
  Size/MD5: 18446645 2b8f36364373461190126817ec872031

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.9_all.deb
  Size/MD5:    38560 ba617aed9cc0de2b3ab0bb27e4b73208
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.9_all.deb
  Size/MD5:    41108 c5723e8875ec8ec61bc3e35d279b0785
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.9_all.deb
  Size/MD5:    38564 4c87c774aa76333f9b6ce71be03abd9e

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_amd64.deb
  Size/MD5:  6727828 250a0dc849c954205639795ead8c913c
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_amd64.deb
  Size/MD5:  1423476 81fa43f4bcdaa9721311dd9cd7977713
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_amd64.deb
  Size/MD5:  6897250 ee100a247642429c58c20cf501da925d
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_amd64.deb
  Size/MD5: 22493122 6c8dc59d6b0f8885bdc08e72f7aef6b6

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_i386.deb
  Size/MD5:  6141858 992e52adad73209d80bab70f7fb22d46
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_i386.deb
  Size/MD5:  1383980 fcbf70966d6875c053e30e153b610991
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_i386.deb
  Size/MD5:  6279892 cb5107c59d51513dc3b7d89ef64c2de1
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_i386.deb
  Size/MD5: 21351224 84fe07a8a90d1d7bdefcdfa8bf34bc55

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_powerpc.deb
  Size/MD5:  6885504 86e9ad51262265b596bf490ce3c46a2d
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_powerpc.deb
  Size/MD5:  1463828 6a87ebba2667b07ca253b7bc3772d91e
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_powerpc.deb
  Size/MD5:  6943956 f8630ffc208f766da49a1628076830b6
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_powerpc.deb
  Size/MD5: 22706410 6e44a8947af147ac14a15fdd66e80bfd

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_sparc.deb
  Size/MD5:  6433916 dea5c30c9bc61cf362cfbb7cb692a280
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_sparc.deb
  Size/MD5:  1435924 5da529e0936388dc5584deb4155ba390
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_sparc.deb
  Size/MD5:  6538958 4e658a8fca75f30eeafbfff2a2bffa9c
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_sparc.deb
  Size/MD5: 21972902 4d273677401e7896b4e65d8fc9996ce5

. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1


Debian Security Advisory DSA-1478-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff January 28, 2008 http://www.debian.org/security/faq


Package : mysql-dfsg-5.0 Vulnerability : buffer overflows Problem type : remote Debian-specific: no CVE Id(s) : CVE-2008-0226 CVE-2008-0227

Luigi Auriemma discovered two buffer overflows in YaSSL, an SSL implementation included in the MySQL database package, which could lead to denial of service and possibly the execution of arbitrary code.

For the unstable distribution (sid), these problems have been fixed in version 5.0.51-3.

For the stable distribution (etch), these problems have been fixed in version 5.0.32-7etch5.

The old stable distribution (sarge) doesn't contain mysql-dfsg-5.0.

We recommend that you upgrade your mysql-dfsg-5.0 package.

Upgrade instructions


wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update will update the internal database apt-get upgrade will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian 4.0 (stable)


Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32.orig.tar.gz Size/MD5 checksum: 16439441 f99df050b0b847adf7702b44e79ac877 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch5.diff.gz Size/MD5 checksum: 165895 05351b7ac0547d3666828c7eba89ee18 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch5.dsc Size/MD5 checksum: 1117 7d6a184cf5bda53d18be88728a0635c4

Architecture independent packages:

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client_5.0.32-7etch5_all.deb Size/MD5 checksum: 45636 c2d87b9755088b3a67851dc4867a67f8 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server_5.0.32-7etch5_all.deb Size/MD5 checksum: 47716 5c9311fc2072be8336424c648497303e http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-common_5.0.32-7etch5_all.deb Size/MD5 checksum: 53944 3a16dd0a2c795cf7e906c648844a9779

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_alpha.deb Size/MD5 checksum: 8912752 826f18c201582262ee622ed9e470a915 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_alpha.deb Size/MD5 checksum: 1950712 47215338ef678adf7ca6f80d9d60613e http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_alpha.deb Size/MD5 checksum: 8407802 e6e87a2edaf5f0405473fb3f5c859b3f http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_alpha.deb Size/MD5 checksum: 27365718 f83e12f0f36c31b4dbd64ab7b1b6f01d http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_alpha.deb Size/MD5 checksum: 47748 91489bb86084a9f6026c6156a4a5faa0

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_amd64.deb Size/MD5 checksum: 7376450 ba1c75fa6963352a0af68c4db08d0c12 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_amd64.deb Size/MD5 checksum: 47708 4a3047795b3030063a47c969cfe4c324 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_amd64.deb Size/MD5 checksum: 1830910 c24fc179d4fb37994b5af2cb8c405ff1 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_amd64.deb Size/MD5 checksum: 25939846 8b0e047de274ed90f69a76f22866561a http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_amd64.deb Size/MD5 checksum: 7547346 003c7231b81203a50ec563ff5142a010

arm architecture (ARM)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_arm.deb Size/MD5 checksum: 47756 0145e1aa5ec02b5c60c2d78bbcd334a0 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_arm.deb Size/MD5 checksum: 25345622 2de813c86f1d10fb2df34d8b9de2336e http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_arm.deb Size/MD5 checksum: 6929754 8a6b3351769b567a468bc7dcb97a2141 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_arm.deb Size/MD5 checksum: 7204866 a8f69933d8081e753b76402e47e7a64a http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_arm.deb Size/MD5 checksum: 1747880 8da665b5f04444dcde03321f24ca8e4b

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_hppa.deb Size/MD5 checksum: 1920486 cb9a2e86902dc3f174926fbd8397a969 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_hppa.deb Size/MD5 checksum: 8046116 1eb6b1199a2c0f6a8502008a2c6df376 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_hppa.deb Size/MD5 checksum: 27055710 085b261bf2ec3820e21ec73bb59f6caa http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_hppa.deb Size/MD5 checksum: 47708 c17ca051ebe8783fa120c4596e32d9c2 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_hppa.deb Size/MD5 checksum: 8003914 59650ba346b2af0d77afbac64e93cca8

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_i386.deb Size/MD5 checksum: 25370152 d615311235c5a9e6d85e7e77b4927d5d http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_i386.deb Size/MD5 checksum: 47746 1040540bc74e34b67d9606a4368162a7 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_i386.deb Size/MD5 checksum: 6971870 90aae8d289cb3df24009c65b1af3b12d http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_i386.deb Size/MD5 checksum: 7189880 6082aa213539a361cced40044161d108 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_i386.deb Size/MD5 checksum: 1793974 ab7cbdd14a9bff04066a865634ef1ce2

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_ia64.deb Size/MD5 checksum: 9736902 1e93082931f1055cd4c1436caa0020f3 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_ia64.deb Size/MD5 checksum: 47710 3369d882bf2b99a05397aaeddf8bf864 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_ia64.deb Size/MD5 checksum: 2115340 472e412113e7ae0bb76853cf0167cd57 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_ia64.deb Size/MD5 checksum: 30408810 8c8982aae5e90c451b08f22bc2a5399d http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_ia64.deb Size/MD5 checksum: 10341648 a5ef1b86109c465131ccfe5a9147bd74

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_mips.deb Size/MD5 checksum: 7655576 b92c42fbbd64a377fcc4277a1696ccdd http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_mips.deb Size/MD5 checksum: 1835994 2650808f606406336f55b31497bea015 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_mips.deb Size/MD5 checksum: 7749018 db3eb1fb41084f7cda145ecc1f808402 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_mips.deb Size/MD5 checksum: 47710 698fd659ef265c937dd045cfb2e9e28a http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_mips.deb Size/MD5 checksum: 26338840 89c569b544aeb60ce6aae1c77d40965e

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_mipsel.deb Size/MD5 checksum: 1789510 2501eed6aaa7143a89f13e4bd9658ecf http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_mipsel.deb Size/MD5 checksum: 47718 ed3dc0fc53b78b2307dc4790ff82a174 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_mipsel.deb Size/MD5 checksum: 7640356 5417137e8b9632964ea0d67e8cd96416 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_mipsel.deb Size/MD5 checksum: 25845474 d379d4a5f900202d6244858d379aa46a http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_mipsel.deb Size/MD5 checksum: 7561164 31fa1242af6a762a92486aa327469d1f

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_powerpc.deb Size/MD5 checksum: 1832312 c6ab2b2c70aed56a7748eb0a5dd04c8c http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_powerpc.deb Size/MD5 checksum: 7573184 f43fb3a11284830b745346775073f92d http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_powerpc.deb Size/MD5 checksum: 7511850 184e9e37e760f4bb3779385d134975db http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_powerpc.deb Size/MD5 checksum: 47708 a76913df77b9f358f88a66875dc13a46 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_powerpc.deb Size/MD5 checksum: 26164462 386da660c381925416238a51b0a847a4

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_s390.deb Size/MD5 checksum: 47714 7fa0b60bff0e106f6328b0b026566008 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_s390.deb Size/MD5 checksum: 26763646 544f49b13f6207c1a104dc9eef9e6dd9 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_s390.deb Size/MD5 checksum: 7413442 b70c6184c3b82ead175debdd569ab807 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_s390.deb Size/MD5 checksum: 7507380 f9cecc1ace4fd2455516986637490930 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_s390.deb Size/MD5 checksum: 1951732 d5eaad746a8db92889febd0da68f1ae5

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_sparc.deb Size/MD5 checksum: 7153228 566328488d67a3843b04689d76f0253d http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_sparc.deb Size/MD5 checksum: 47714 551a6f9a790b301d63c856ecab13be75 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_sparc.deb Size/MD5 checksum: 7013384 3915c6846d5ffce6e321b7e40006cb66 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_sparc.deb Size/MD5 checksum: 1797430 b0bd228090c8923d08c9b8ee84a1edb8 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_sparc.deb Size/MD5 checksum: 25425084 a9934459b8cde72354ffc463b2ec140f

These files will probably be moved into the stable distribution on its next update.


For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHnjjKXm3vHE4uyloRApi/AKCLKlM616TTchb0zEQ8K4cOCdgZhwCffa1J oQ57J3yhzeNDDwqXdxLvhxM= =6ogr -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200801-0204",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.2"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.4"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.46"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.11"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.12"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.16"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.30"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.42"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.14"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.40"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.15"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.22"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.23"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.44"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.1.5"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.36"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.15"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.10"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.52"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "6.10"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.1"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.58"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.7"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.66"
      },
      {
        "model": "yassl",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "yassl",
        "version": "1.7.5"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.17"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.20"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "7.04"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.5"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.20"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.3"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.45"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.62"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "6.06"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.18"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.44"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "5.0"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.4"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.60"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.51"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.28"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.8"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.25"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.66"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.3"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.56"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.48"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "7.10"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.16"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.10"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.6"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.9"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.32"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.64"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.13"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.0"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.17"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.41"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.50"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.30"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.38"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.19"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.21"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.60"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.54"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.34"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.1.2"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.36"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.5.4"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.26"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.1"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mysql",
        "version": "5.0.24"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.0.56"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "drupal",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mandriva",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "pear xml rpc",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "phpxmlrpc",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "postnuke",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "serendipity",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "trustix secure linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubuntu linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "wordpress",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xoops",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "phpmyfaq",
        "version": null
      },
      {
        "model": "mysql",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "mysql ab",
        "version": "5.1.23"
      },
      {
        "model": "community server",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "mysql ab",
        "version": "5.0.51a"
      },
      {
        "model": "enterprise server",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "mysql ab",
        "version": "5.0.50sp1a"
      },
      {
        "model": "enterprise server",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "mysql ab",
        "version": "5.0.54a"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.5.5"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mysql",
        "version": "5.1.20"
      },
      {
        "model": "mysql",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mysql",
        "version": "5.1.21"
      },
      {
        "model": "yassl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yassl",
        "version": "1.7.5"
      },
      {
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "7.10"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "7.10"
      },
      {
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "7.10"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "7.10"
      },
      {
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "7.04"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "7.04"
      },
      {
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "7.04"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "7.04"
      },
      {
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "6.10"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "6.10"
      },
      {
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "6.10"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "6.10"
      },
      {
        "model": "linux lts sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "6.06"
      },
      {
        "model": "linux lts powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "6.06"
      },
      {
        "model": "linux lts i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "6.06"
      },
      {
        "model": "linux lts amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "6.06"
      },
      {
        "model": "linux mandrake x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "2008.0"
      },
      {
        "model": "linux mandrake",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "2008.0"
      },
      {
        "model": "linux mandrake x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "2007.1"
      },
      {
        "model": "linux mandrake",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "2007.1"
      },
      {
        "model": "corporate server x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandrakesoft",
        "version": "4.0"
      },
      {
        "model": "corporate server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandrakesoft",
        "version": "4.0"
      },
      {
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "linux s/390",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "linux mipsel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "linux mips",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "linux m68k",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "linux ia-64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "linux ia-32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "linux hppa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "linux arm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "linux alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.5"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#442845"
      },
      {
        "db": "BID",
        "id": "27140"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001045"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-154"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0226"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:yassl:yassl:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.7.5",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-0226"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Luigi Auriemma\u203b aluigi@pivx.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-154"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2008-0226",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2008-0226",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-30351",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2008-0226",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#442845",
            "trust": 0.8,
            "value": "20.75"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200801-154",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-30351",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2008-0226",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#442845"
      },
      {
        "db": "VULHUB",
        "id": "VHN-30351"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-0226"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001045"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-154"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0226"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) \"input_buffer\u0026 operator\u003e\u003e\" in yassl_imp.cpp. yaSSL is prone to multiple remote buffer-overflow vulnerabilities. Failed attacks will cause denial-of-service conditions. \nyaSSL 1.7.5 is vulnerable to these issues; other versions are also likely to be affected. # MySQL yaSSL SSL Hello Message Buffer Overflow 1. Vulnerability introduction and analysis yaSSL is an open source software package used to implement SSL. There are multiple remote overflow and invalid memory access issues in the yaSSL implementation, and remote attackers may take advantage of this vulnerability to control the server. The yaSSL (1.7.5 and earlier) implementation to Stack Buffer Overflow is bundled with MySQL \u003c= 6.0. Code analysis: The buffer structure used to contain the data in the Hello message received by the client is as follows (from yassl_imp.hpp): class ClientHello : public HandShakeBase { ProtocolVersion client_version_; Random random_; uint8 id_len_; // session id length opaque session_id_[ID_LEN]; uint16 suite_len_; // cipher suite length opaque cipher_suites_[MAX_SUITE_SZ]; uint8 comp_len_; // compression length CompressionMethod compression_methods_; ... Here ID_LEN length is 32 units, MAX_SUITE_SZ is 64, RAN_LEN (RANd_LEN) 32. If an old version of the Hello message is received, the called ProcessOldClientHello function does not perform the necessary checks to limit the amount of data filling the above three fields, resulting in a buffer overflow vulnerability. The following is the vulnerable code in handshake.cpp: void ProcessOldClientHello(input_buffer\u0026 input, SSL\u0026 ssl) ... ClientHello ch; ... for (uint16 i = 0; i \u003c ch. \n \n Sergei Golubchik found that MySQL did not properly validate optional\n data or index directory paths given in a CREATE TABLE statement; as\n well it would not, under certain conditions, prevent two databases\n from using the same paths for data or index files.  This could allow\n an authenticated user with appropriate privilege to create tables in\n one database to read and manipulate data in tables later created in\n other databases, regardless of GRANT privileges (CVE-2008-2079). \n \n The updated packages have been patched to correct these issues. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0226\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0227\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2007.1:\n 56e59e5a7413ca900767afa20480fff5  2007.1/i586/libmysql15-5.0.45-8.2mdv2007.1.i586.rpm\n c11348f9b60a3fb153cf07a7b2e22502  2007.1/i586/libmysql-devel-5.0.45-8.2mdv2007.1.i586.rpm\n a60fca42161427ed528a6a1fd58c61e3  2007.1/i586/libmysql-static-devel-5.0.45-8.2mdv2007.1.i586.rpm\n a6c4108497edb6cd0d7f723ca5f81c1f  2007.1/i586/mysql-5.0.45-8.2mdv2007.1.i586.rpm\n 62b091bfed614ed2be0e9f1dabc00e6e  2007.1/i586/mysql-bench-5.0.45-8.2mdv2007.1.i586.rpm\n 65c4cbcbaa11ad0fd5521ff9821a0e71  2007.1/i586/mysql-client-5.0.45-8.2mdv2007.1.i586.rpm\n 6cafb4fc0190c3d8c301737cc1b2d584  2007.1/i586/mysql-common-5.0.45-8.2mdv2007.1.i586.rpm\n ab7ff6bc5ed1e3add97e87eadffdf7d0  2007.1/i586/mysql-max-5.0.45-8.2mdv2007.1.i586.rpm\n 0c0d3817061fed8a9495b976e9aad4f6  2007.1/i586/mysql-ndb-extra-5.0.45-8.2mdv2007.1.i586.rpm\n e180f9184b397c76f121fa2cbcc249ee  2007.1/i586/mysql-ndb-management-5.0.45-8.2mdv2007.1.i586.rpm\n 11f6b6b340ec050489117a31ba1ada7b  2007.1/i586/mysql-ndb-storage-5.0.45-8.2mdv2007.1.i586.rpm\n 27d5c830d808a9198b5a3234ab635c31  2007.1/i586/mysql-ndb-tools-5.0.45-8.2mdv2007.1.i586.rpm \n 0b18a06428b4c5351ea19433a18ba44b  2007.1/SRPMS/mysql-5.0.45-8.2mdv2007.1.src.rpm\n\n Mandriva Linux 2007.1/X86_64:\n 861ae8a12d105c0537345f4b1b6364a6  2007.1/x86_64/lib64mysql15-5.0.45-8.2mdv2007.1.x86_64.rpm\n 74995c774432f4acacf682d14b738bae  2007.1/x86_64/lib64mysql-devel-5.0.45-8.2mdv2007.1.x86_64.rpm\n 5453d884b0edf40606bd78e62aef8101  2007.1/x86_64/lib64mysql-static-devel-5.0.45-8.2mdv2007.1.x86_64.rpm\n ef7ab96c6a492dad1a5f1463eaf5568b  2007.1/x86_64/mysql-5.0.45-8.2mdv2007.1.x86_64.rpm\n e6527ea8482a7928095a2d1d24953ad6  2007.1/x86_64/mysql-bench-5.0.45-8.2mdv2007.1.x86_64.rpm\n 896ed2418af55577669d67b2b110fded  2007.1/x86_64/mysql-client-5.0.45-8.2mdv2007.1.x86_64.rpm\n 9cfc765f29d39220862dd8b38a7baddb  2007.1/x86_64/mysql-common-5.0.45-8.2mdv2007.1.x86_64.rpm\n f738941dbf2fb982e5f91ad1f5b8dd99  2007.1/x86_64/mysql-max-5.0.45-8.2mdv2007.1.x86_64.rpm\n 604b3cda2222cc031819c1a76f64974e  2007.1/x86_64/mysql-ndb-extra-5.0.45-8.2mdv2007.1.x86_64.rpm\n 944f87e17f3a30a41392b57005b3866d  2007.1/x86_64/mysql-ndb-management-5.0.45-8.2mdv2007.1.x86_64.rpm\n abe714a023e8019dc2379f38a10287c6  2007.1/x86_64/mysql-ndb-storage-5.0.45-8.2mdv2007.1.x86_64.rpm\n 60585f5c00ea687c710da9bf8dc620b0  2007.1/x86_64/mysql-ndb-tools-5.0.45-8.2mdv2007.1.x86_64.rpm \n 0b18a06428b4c5351ea19433a18ba44b  2007.1/SRPMS/mysql-5.0.45-8.2mdv2007.1.src.rpm\n\n Mandriva Linux 2008.0:\n 32915a44b313f9752d53864929acacef  2008.0/i586/libmysql15-5.0.45-8.2mdv2008.0.i586.rpm\n 886f68f93c90d168f0f376f2bdf19dfe  2008.0/i586/libmysql-devel-5.0.45-8.2mdv2008.0.i586.rpm\n 05d52109e0e751d6ecb330361f0c49b1  2008.0/i586/libmysql-static-devel-5.0.45-8.2mdv2008.0.i586.rpm\n c2d269602985c48dbfaa56edbb2089a5  2008.0/i586/mysql-5.0.45-8.2mdv2008.0.i586.rpm\n fe5a49a0dbcf5b5b862fa15c697ec734  2008.0/i586/mysql-bench-5.0.45-8.2mdv2008.0.i586.rpm\n 5d9e574e07b13db1e98ac5084ef24c52  2008.0/i586/mysql-client-5.0.45-8.2mdv2008.0.i586.rpm\n c3a73f6ba9467995e4eeeb2994987e8c  2008.0/i586/mysql-common-5.0.45-8.2mdv2008.0.i586.rpm\n faca35a011bd9e95c3aded56c498efe7  2008.0/i586/mysql-max-5.0.45-8.2mdv2008.0.i586.rpm\n ae5bece63ecfacd37582c68288e146a6  2008.0/i586/mysql-ndb-extra-5.0.45-8.2mdv2008.0.i586.rpm\n 6948d8799ff1e8e9ae3908dcfdfafc2a  2008.0/i586/mysql-ndb-management-5.0.45-8.2mdv2008.0.i586.rpm\n 11566a84793e2eb8b2e55fe28d89b918  2008.0/i586/mysql-ndb-storage-5.0.45-8.2mdv2008.0.i586.rpm\n 7e8e44013f0de7b0cd2c527da9202985  2008.0/i586/mysql-ndb-tools-5.0.45-8.2mdv2008.0.i586.rpm \n af4075fd835e0372f1f6745f2f6f2d24  2008.0/SRPMS/mysql-5.0.45-8.2mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n c3683e4b578bcf573913d2c8ea3bcc64  2008.0/x86_64/lib64mysql15-5.0.45-8.2mdv2008.0.x86_64.rpm\n a15bc584715bfa86221d021a45610701  2008.0/x86_64/lib64mysql-devel-5.0.45-8.2mdv2008.0.x86_64.rpm\n 7037c5117e10169e7f0d862cb3916a7d  2008.0/x86_64/lib64mysql-static-devel-5.0.45-8.2mdv2008.0.x86_64.rpm\n 624b99283d71f7fc372029d188b0d68e  2008.0/x86_64/mysql-5.0.45-8.2mdv2008.0.x86_64.rpm\n 3efcb2ad37ae4d91f5915548fcebb0fc  2008.0/x86_64/mysql-bench-5.0.45-8.2mdv2008.0.x86_64.rpm\n 69b7b8e85e21c015d1db4822885f9e70  2008.0/x86_64/mysql-client-5.0.45-8.2mdv2008.0.x86_64.rpm\n cd9cc2fd720dedef518fed7f6dbcd851  2008.0/x86_64/mysql-common-5.0.45-8.2mdv2008.0.x86_64.rpm\n dc1da6c335fdbe30762c3bdc8431de71  2008.0/x86_64/mysql-max-5.0.45-8.2mdv2008.0.x86_64.rpm\n 065d9a2c3515567c0d11a45a44b2b902  2008.0/x86_64/mysql-ndb-extra-5.0.45-8.2mdv2008.0.x86_64.rpm\n 8fb80d3e1b683af128b77d1ab9e6ad06  2008.0/x86_64/mysql-ndb-management-5.0.45-8.2mdv2008.0.x86_64.rpm\n 9e4a50fcfb351876e1294bcc113a9d01  2008.0/x86_64/mysql-ndb-storage-5.0.45-8.2mdv2008.0.x86_64.rpm\n 0788ada6ccdddb7db76ebcf3efbe8e0b  2008.0/x86_64/mysql-ndb-tools-5.0.45-8.2mdv2008.0.x86_64.rpm \n af4075fd835e0372f1f6745f2f6f2d24  2008.0/SRPMS/mysql-5.0.45-8.2mdv2008.0.src.rpm\n\n Corporate 4.0:\n 08c68b948479e0609200d3a75fa1e6f8  corporate/4.0/i586/libmysql15-5.0.45-7.2.20060mlcs4.i586.rpm\n 9559df7a4dd7a7a5cd2f3350d0aaf644  corporate/4.0/i586/libmysql-devel-5.0.45-7.2.20060mlcs4.i586.rpm\n 7c6b41f3e966a9533fe2e508099e9ac3  corporate/4.0/i586/libmysql-static-devel-5.0.45-7.2.20060mlcs4.i586.rpm\n 83fc3360f5f3d5e4612e8b2dcccb9d86  corporate/4.0/i586/mysql-5.0.45-7.2.20060mlcs4.i586.rpm\n 119770dc70f1dec99770b89569d5f244  corporate/4.0/i586/mysql-bench-5.0.45-7.2.20060mlcs4.i586.rpm\n eaba4a0339945fe1e6f3b2197d43dc6d  corporate/4.0/i586/mysql-client-5.0.45-7.2.20060mlcs4.i586.rpm\n 9d19c37b04c4db67c135ecd277b48d55  corporate/4.0/i586/mysql-common-5.0.45-7.2.20060mlcs4.i586.rpm\n 29ce0477fee72dd9f76665b7ab3d3733  corporate/4.0/i586/mysql-max-5.0.45-7.2.20060mlcs4.i586.rpm\n 76ef2d6cedff1526cea6e5391e53bd0b  corporate/4.0/i586/mysql-ndb-extra-5.0.45-7.2.20060mlcs4.i586.rpm\n efd3de6baa6c09f0926e1d71fdcbb7d2  corporate/4.0/i586/mysql-ndb-management-5.0.45-7.2.20060mlcs4.i586.rpm\n 58acbcf9bd22ae8b686f270959a24d9a  corporate/4.0/i586/mysql-ndb-storage-5.0.45-7.2.20060mlcs4.i586.rpm\n 0679c750bc5dd1f0ad9c26513c9d5a1f  corporate/4.0/i586/mysql-ndb-tools-5.0.45-7.2.20060mlcs4.i586.rpm \n a2744801fe9ed017d4cfb3b40d7dcc42  corporate/4.0/SRPMS/mysql-5.0.45-7.2.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 1540c030207321b12c1dbf6518b259ea  corporate/4.0/x86_64/lib64mysql15-5.0.45-7.2.20060mlcs4.x86_64.rpm\n b8a1daf95d7212f43635d06e709c3318  corporate/4.0/x86_64/lib64mysql-devel-5.0.45-7.2.20060mlcs4.x86_64.rpm\n 11ff72e78bca0c13e2bbe1d3eba69b6f  corporate/4.0/x86_64/lib64mysql-static-devel-5.0.45-7.2.20060mlcs4.x86_64.rpm\n ec357bc74168b72e716ee47fdc8953ef  corporate/4.0/x86_64/mysql-5.0.45-7.2.20060mlcs4.x86_64.rpm\n 2d4a49b5b2ef6be7f180c37bf6848502  corporate/4.0/x86_64/mysql-bench-5.0.45-7.2.20060mlcs4.x86_64.rpm\n 5acf56e4dc62af041eeeff90ad32ddbf  corporate/4.0/x86_64/mysql-client-5.0.45-7.2.20060mlcs4.x86_64.rpm\n eadd8f9b5afdadc1e67ab76e63c5ede6  corporate/4.0/x86_64/mysql-common-5.0.45-7.2.20060mlcs4.x86_64.rpm\n 233bd234e9c9ce5922b9655a6fdd72ce  corporate/4.0/x86_64/mysql-max-5.0.45-7.2.20060mlcs4.x86_64.rpm\n 97494344056c6e4f8340eaf0036ac97f  corporate/4.0/x86_64/mysql-ndb-extra-5.0.45-7.2.20060mlcs4.x86_64.rpm\n ca70ce3ed5c592ec41151b1c6f1d43d8  corporate/4.0/x86_64/mysql-ndb-management-5.0.45-7.2.20060mlcs4.x86_64.rpm\n 379dab3d7aecfba0b93d5e5691d742db  corporate/4.0/x86_64/mysql-ndb-storage-5.0.45-7.2.20060mlcs4.x86_64.rpm\n e0e9ca0dc122c8657aada9a9db758ca1  corporate/4.0/x86_64/mysql-ndb-tools-5.0.45-7.2.20060mlcs4.x86_64.rpm \n a2744801fe9ed017d4cfb3b40d7dcc42  corporate/4.0/SRPMS/mysql-5.0.45-7.2.20060mlcs4.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFIgkXmmqjQ0CJFipgRAkLWAKClwPBbIW2SXkcexkEJjW79kexPLQCfRirO\nwV2/ikre4rdv7NLrZRgofos=\n=qdV+\n-----END PGP SIGNATURE-----\n. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nNucleus XML-RPC PHP Code Execution Vulnerability\n\nSECUNIA ADVISORY ID:\nSA15895\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15895/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nNucleus 3.x\nhttp://secunia.com/product/3699/\n\nDESCRIPTION:\nA vulnerability has been reported in Nucleus, which can be exploited\nby malicious people to compromise a vulnerable system. \nhttp://sourceforge.net/project/showfiles.php?group_id=66479\n\nOTHER REFERENCES:\nSA15852:\nhttp://secunia.com/advisories/15852/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. =========================================================== \nUbuntu Security Notice USN-588-2             April 02, 2008\nmysql-dfsg-5.0 regression\nhttps://launchpad.net/bugs/209699\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n  mysql-server-5.0                5.0.22-0ubuntu6.06.9\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes. \n\nDetails follow:\n\nUSN-588-1 fixed vulnerabilities in MySQL. In fixing CVE-2007-2692 for\nUbuntu 6.06, additional improvements were made to make privilege checks\nmore restictive. As a result, an upstream bug was exposed which could\ncause operations on tables or views in a different database to fail. This\nupdate fixes the problem. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\n Masaaki Hirose discovered that MySQL could be made to dereference\n a NULL pointer. An authenticated user could cause a denial of service\n (application crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA\n table. This issue only affects Ubuntu 6.06 and 6.10. (CVE-2006-7232)\n \n Alexander Nozdrin discovered that MySQL did not restore database access\n privileges when returning from SQL SECURITY INVOKER stored routines. An\n authenticated user could exploit this to gain privileges. This issue\n does not affect Ubuntu 7.10. (CVE-2007-2692)\n \n Martin Friebe discovered that MySQL did not properly update the DEFINER\n value of an altered view. An authenticated user could use CREATE SQL\n SECURITY DEFINER VIEW and ALTER VIEW statements to gain privileges. \n (CVE-2007-6303)\n \n Luigi Auriemma discovered that yaSSL as included in MySQL did not\n properly validate its input. This issue did not affect Ubuntu 6.06 in the default installation. \n (CVE-2008-0226, CVE-2008-0227)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n  Source archives:\n\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.9.diff.gz\n      Size/MD5:   155085 f8c7ef90adb69cf67cc6366612b63d48\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.9.dsc\n      Size/MD5:     1114 d305551acc1c106afc8fcea708bf7748\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22.orig.tar.gz\n      Size/MD5: 18446645 2b8f36364373461190126817ec872031\n\n  Architecture independent packages:\n\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.9_all.deb\n      Size/MD5:    38560 ba617aed9cc0de2b3ab0bb27e4b73208\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.9_all.deb\n      Size/MD5:    41108 c5723e8875ec8ec61bc3e35d279b0785\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.9_all.deb\n      Size/MD5:    38564 4c87c774aa76333f9b6ce71be03abd9e\n\n  amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_amd64.deb\n      Size/MD5:  6727828 250a0dc849c954205639795ead8c913c\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_amd64.deb\n      Size/MD5:  1423476 81fa43f4bcdaa9721311dd9cd7977713\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_amd64.deb\n      Size/MD5:  6897250 ee100a247642429c58c20cf501da925d\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_amd64.deb\n      Size/MD5: 22493122 6c8dc59d6b0f8885bdc08e72f7aef6b6\n\n  i386 architecture (x86 compatible Intel/AMD):\n\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_i386.deb\n      Size/MD5:  6141858 992e52adad73209d80bab70f7fb22d46\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_i386.deb\n      Size/MD5:  1383980 fcbf70966d6875c053e30e153b610991\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_i386.deb\n      Size/MD5:  6279892 cb5107c59d51513dc3b7d89ef64c2de1\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_i386.deb\n      Size/MD5: 21351224 84fe07a8a90d1d7bdefcdfa8bf34bc55\n\n  powerpc architecture (Apple Macintosh G3/G4/G5):\n\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_powerpc.deb\n      Size/MD5:  6885504 86e9ad51262265b596bf490ce3c46a2d\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_powerpc.deb\n      Size/MD5:  1463828 6a87ebba2667b07ca253b7bc3772d91e\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_powerpc.deb\n      Size/MD5:  6943956 f8630ffc208f766da49a1628076830b6\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_powerpc.deb\n      Size/MD5: 22706410 6e44a8947af147ac14a15fdd66e80bfd\n\n  sparc architecture (Sun SPARC/UltraSPARC):\n\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_sparc.deb\n      Size/MD5:  6433916 dea5c30c9bc61cf362cfbb7cb692a280\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_sparc.deb\n      Size/MD5:  1435924 5da529e0936388dc5584deb4155ba390\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_sparc.deb\n      Size/MD5:  6538958 4e658a8fca75f30eeafbfff2a2bffa9c\n    http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_sparc.deb\n      Size/MD5: 21972902 4d273677401e7896b4e65d8fc9996ce5\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1478-1                  security@debian.org\nhttp://www.debian.org/security/                       Moritz Muehlenhoff\nJanuary 28, 2008                      http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage        : mysql-dfsg-5.0\nVulnerability  : buffer overflows\nProblem type   : remote\nDebian-specific: no\nCVE Id(s)      : CVE-2008-0226 CVE-2008-0227\n\nLuigi Auriemma discovered two buffer overflows in YaSSL, an SSL\nimplementation included in the MySQL database package, which could lead\nto denial of service and possibly the execution of arbitrary code. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 5.0.51-3. \n\nFor the stable distribution (etch), these problems have been fixed in\nversion 5.0.32-7etch5. \n\nThe old stable distribution (sarge) doesn\u0027t contain mysql-dfsg-5.0. \n\nWe recommend that you upgrade your mysql-dfsg-5.0 package. \n\nUpgrade instructions\n- --------------------\n\nwget url\n        will fetch the file for you\ndpkg -i file.deb\n        will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n        will update the internal database\napt-get upgrade\n        will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian 4.0 (stable)\n- -------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32.orig.tar.gz\n    Size/MD5 checksum: 16439441 f99df050b0b847adf7702b44e79ac877\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch5.diff.gz\n    Size/MD5 checksum:   165895 05351b7ac0547d3666828c7eba89ee18\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch5.dsc\n    Size/MD5 checksum:     1117 7d6a184cf5bda53d18be88728a0635c4\n\nArchitecture independent packages:\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client_5.0.32-7etch5_all.deb\n    Size/MD5 checksum:    45636 c2d87b9755088b3a67851dc4867a67f8\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server_5.0.32-7etch5_all.deb\n    Size/MD5 checksum:    47716 5c9311fc2072be8336424c648497303e\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-common_5.0.32-7etch5_all.deb\n    Size/MD5 checksum:    53944 3a16dd0a2c795cf7e906c648844a9779\n\nalpha architecture (DEC Alpha)\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_alpha.deb\n    Size/MD5 checksum:  8912752 826f18c201582262ee622ed9e470a915\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_alpha.deb\n    Size/MD5 checksum:  1950712 47215338ef678adf7ca6f80d9d60613e\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_alpha.deb\n    Size/MD5 checksum:  8407802 e6e87a2edaf5f0405473fb3f5c859b3f\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_alpha.deb\n    Size/MD5 checksum: 27365718 f83e12f0f36c31b4dbd64ab7b1b6f01d\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_alpha.deb\n    Size/MD5 checksum:    47748 91489bb86084a9f6026c6156a4a5faa0\n\namd64 architecture (AMD x86_64 (AMD64))\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_amd64.deb\n    Size/MD5 checksum:  7376450 ba1c75fa6963352a0af68c4db08d0c12\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_amd64.deb\n    Size/MD5 checksum:    47708 4a3047795b3030063a47c969cfe4c324\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_amd64.deb\n    Size/MD5 checksum:  1830910 c24fc179d4fb37994b5af2cb8c405ff1\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_amd64.deb\n    Size/MD5 checksum: 25939846 8b0e047de274ed90f69a76f22866561a\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_amd64.deb\n    Size/MD5 checksum:  7547346 003c7231b81203a50ec563ff5142a010\n\narm architecture (ARM)\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_arm.deb\n    Size/MD5 checksum:    47756 0145e1aa5ec02b5c60c2d78bbcd334a0\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_arm.deb\n    Size/MD5 checksum: 25345622 2de813c86f1d10fb2df34d8b9de2336e\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_arm.deb\n    Size/MD5 checksum:  6929754 8a6b3351769b567a468bc7dcb97a2141\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_arm.deb\n    Size/MD5 checksum:  7204866 a8f69933d8081e753b76402e47e7a64a\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_arm.deb\n    Size/MD5 checksum:  1747880 8da665b5f04444dcde03321f24ca8e4b\n\nhppa architecture (HP PA RISC)\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_hppa.deb\n    Size/MD5 checksum:  1920486 cb9a2e86902dc3f174926fbd8397a969\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_hppa.deb\n    Size/MD5 checksum:  8046116 1eb6b1199a2c0f6a8502008a2c6df376\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_hppa.deb\n    Size/MD5 checksum: 27055710 085b261bf2ec3820e21ec73bb59f6caa\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_hppa.deb\n    Size/MD5 checksum:    47708 c17ca051ebe8783fa120c4596e32d9c2\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_hppa.deb\n    Size/MD5 checksum:  8003914 59650ba346b2af0d77afbac64e93cca8\n\ni386 architecture (Intel ia32)\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_i386.deb\n    Size/MD5 checksum: 25370152 d615311235c5a9e6d85e7e77b4927d5d\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_i386.deb\n    Size/MD5 checksum:    47746 1040540bc74e34b67d9606a4368162a7\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_i386.deb\n    Size/MD5 checksum:  6971870 90aae8d289cb3df24009c65b1af3b12d\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_i386.deb\n    Size/MD5 checksum:  7189880 6082aa213539a361cced40044161d108\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_i386.deb\n    Size/MD5 checksum:  1793974 ab7cbdd14a9bff04066a865634ef1ce2\n\nia64 architecture (Intel ia64)\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_ia64.deb\n    Size/MD5 checksum:  9736902 1e93082931f1055cd4c1436caa0020f3\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_ia64.deb\n    Size/MD5 checksum:    47710 3369d882bf2b99a05397aaeddf8bf864\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_ia64.deb\n    Size/MD5 checksum:  2115340 472e412113e7ae0bb76853cf0167cd57\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_ia64.deb\n    Size/MD5 checksum: 30408810 8c8982aae5e90c451b08f22bc2a5399d\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_ia64.deb\n    Size/MD5 checksum: 10341648 a5ef1b86109c465131ccfe5a9147bd74\n\nmips architecture (MIPS (Big Endian))\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_mips.deb\n    Size/MD5 checksum:  7655576 b92c42fbbd64a377fcc4277a1696ccdd\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_mips.deb\n    Size/MD5 checksum:  1835994 2650808f606406336f55b31497bea015\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_mips.deb\n    Size/MD5 checksum:  7749018 db3eb1fb41084f7cda145ecc1f808402\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_mips.deb\n    Size/MD5 checksum:    47710 698fd659ef265c937dd045cfb2e9e28a\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_mips.deb\n    Size/MD5 checksum: 26338840 89c569b544aeb60ce6aae1c77d40965e\n\nmipsel architecture (MIPS (Little Endian))\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_mipsel.deb\n    Size/MD5 checksum:  1789510 2501eed6aaa7143a89f13e4bd9658ecf\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_mipsel.deb\n    Size/MD5 checksum:    47718 ed3dc0fc53b78b2307dc4790ff82a174\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_mipsel.deb\n    Size/MD5 checksum:  7640356 5417137e8b9632964ea0d67e8cd96416\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_mipsel.deb\n    Size/MD5 checksum: 25845474 d379d4a5f900202d6244858d379aa46a\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_mipsel.deb\n    Size/MD5 checksum:  7561164 31fa1242af6a762a92486aa327469d1f\n\npowerpc architecture (PowerPC)\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_powerpc.deb\n    Size/MD5 checksum:  1832312 c6ab2b2c70aed56a7748eb0a5dd04c8c\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_powerpc.deb\n    Size/MD5 checksum:  7573184 f43fb3a11284830b745346775073f92d\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_powerpc.deb\n    Size/MD5 checksum:  7511850 184e9e37e760f4bb3779385d134975db\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_powerpc.deb\n    Size/MD5 checksum:    47708 a76913df77b9f358f88a66875dc13a46\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_powerpc.deb\n    Size/MD5 checksum: 26164462 386da660c381925416238a51b0a847a4\n\ns390 architecture (IBM S/390)\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_s390.deb\n    Size/MD5 checksum:    47714 7fa0b60bff0e106f6328b0b026566008\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_s390.deb\n    Size/MD5 checksum: 26763646 544f49b13f6207c1a104dc9eef9e6dd9\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_s390.deb\n    Size/MD5 checksum:  7413442 b70c6184c3b82ead175debdd569ab807\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_s390.deb\n    Size/MD5 checksum:  7507380 f9cecc1ace4fd2455516986637490930\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_s390.deb\n    Size/MD5 checksum:  1951732 d5eaad746a8db92889febd0da68f1ae5\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_sparc.deb\n    Size/MD5 checksum:  7153228 566328488d67a3843b04689d76f0253d\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_sparc.deb\n    Size/MD5 checksum:    47714 551a6f9a790b301d63c856ecab13be75\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_sparc.deb\n    Size/MD5 checksum:  7013384 3915c6846d5ffce6e321b7e40006cb66\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_sparc.deb\n    Size/MD5 checksum:  1797430 b0bd228090c8923d08c9b8ee84a1edb8\n  http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_sparc.deb\n    Size/MD5 checksum: 25425084 a9934459b8cde72354ffc463b2ec140f\n\n\n  These files will probably be moved into the stable distribution on\n  its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.6 (GNU/Linux)\n\niD8DBQFHnjjKXm3vHE4uyloRApi/AKCLKlM616TTchb0zEQ8K4cOCdgZhwCffa1J\noQ57J3yhzeNDDwqXdxLvhxM=\n=6ogr\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-0226"
      },
      {
        "db": "CERT/CC",
        "id": "VU#442845"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001045"
      },
      {
        "db": "BID",
        "id": "27140"
      },
      {
        "db": "VULHUB",
        "id": "VHN-30351"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-0226"
      },
      {
        "db": "PACKETSTORM",
        "id": "68366"
      },
      {
        "db": "PACKETSTORM",
        "id": "64766"
      },
      {
        "db": "PACKETSTORM",
        "id": "38388"
      },
      {
        "db": "PACKETSTORM",
        "id": "65137"
      },
      {
        "db": "PACKETSTORM",
        "id": "63104"
      }
    ],
    "trust": 3.24
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=16849",
        "trust": 0.3,
        "type": "exploit"
      },
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-30351",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-30351"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-0226"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2008-0226",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "27140",
        "trust": 2.9
      },
      {
        "db": "SECUNIA",
        "id": "28419",
        "trust": 2.6
      },
      {
        "db": "SECUNIA",
        "id": "28324",
        "trust": 2.6
      },
      {
        "db": "SECUNIA",
        "id": "29443",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "32222",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "28597",
        "trust": 1.8
      },
      {
        "db": "BID",
        "id": "31681",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-2780",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-0560",
        "trust": 1.8
      },
      {
        "db": "SREASON",
        "id": "3531",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "15895",
        "trust": 0.9
      },
      {
        "db": "SECUNIA",
        "id": "15810",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "15922",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "15852",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "15855",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "15861",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "15862",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "15872",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "15883",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "15884",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "14088",
        "trust": 0.8
      },
      {
        "db": "SECTRACK",
        "id": "1014327",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#442845",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001045",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-154",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "63104",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "68366",
        "trust": 0.2
      },
      {
        "db": "EXPLOIT-DB",
        "id": "16849",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "85678",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "82247",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "16701",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "9953",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-71206",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-67003",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-30351",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-0226",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "64766",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "38388",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "65137",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#442845"
      },
      {
        "db": "VULHUB",
        "id": "VHN-30351"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-0226"
      },
      {
        "db": "BID",
        "id": "27140"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001045"
      },
      {
        "db": "PACKETSTORM",
        "id": "68366"
      },
      {
        "db": "PACKETSTORM",
        "id": "64766"
      },
      {
        "db": "PACKETSTORM",
        "id": "38388"
      },
      {
        "db": "PACKETSTORM",
        "id": "65137"
      },
      {
        "db": "PACKETSTORM",
        "id": "63104"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-154"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0226"
      }
    ]
  },
  "id": "VAR-200801-0204",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-30351"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-07-23T19:25:13.959000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HT3216",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/ht3216"
      },
      {
        "title": "HT3216",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/ht3216?viewlocale=ja_jp"
      },
      {
        "title": "releasenotes-es-5-0-54a",
        "trust": 0.8,
        "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-54a.html"
      },
      {
        "title": "releasenotes-es-5-0-50sp1a",
        "trust": 0.8,
        "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-50sp1a.html"
      },
      {
        "title": "Changes in MySQL 5.1.23",
        "trust": 0.8,
        "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
      },
      {
        "title": "releasenotes-cs-5-0-51a",
        "trust": 0.8,
        "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51a.html"
      },
      {
        "title": "Debian Security Advisories: DSA-1478-1 mysql-dfsg-5.0 -- buffer overflows",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=2b2cb23a9e6fe80baeb726ee71987169"
      },
      {
        "title": "Ubuntu Security Notice: mysql-dfsg-5.0 regression",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-588-2"
      },
      {
        "title": "Ubuntu Security Notice: mysql-dfsg-5.0 vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-588-1"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/dbutter/whitehat_public "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2008-0226"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001045"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-30351"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001045"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0226"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.7,
        "url": "http://www.securityfocus.com/bid/27140"
      },
      {
        "trust": 1.8,
        "url": "http://lists.apple.com/archives/security-announce/2008/oct/msg00001.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/bid/31681"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/archive/1/485810/100/0/threaded"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/archive/1/485811/100/0/threaded"
      },
      {
        "trust": 1.8,
        "url": "http://bugs.mysql.com/33814"
      },
      {
        "trust": 1.8,
        "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
      },
      {
        "trust": 1.8,
        "url": "http://support.apple.com/kb/ht3216"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2008/dsa-1478"
      },
      {
        "trust": 1.8,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:150"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/28324"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/28419"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/28597"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/29443"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/32222"
      },
      {
        "trust": 1.8,
        "url": "http://securityreason.com/securityalert/3531"
      },
      {
        "trust": 1.8,
        "url": "http://www.ubuntu.com/usn/usn-588-1"
      },
      {
        "trust": 1.8,
        "url": "http://www.vupen.com/english/advisories/2008/0560/references"
      },
      {
        "trust": 1.8,
        "url": "http://www.vupen.com/english/advisories/2008/2780"
      },
      {
        "trust": 1.8,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431"
      },
      {
        "trust": 1.8,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/15895/"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/15852/"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0226"
      },
      {
        "trust": 0.8,
        "url": "http://www.hardened-php.net/advisory-022005.php"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/15861/"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/15862/"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/15884/"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/15883/"
      },
      {
        "trust": 0.8,
        "url": "http://news.postnuke.com/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=2699"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/15855/"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/15810/"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/15872/"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/15922/"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2005/jun/1014327.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.gulftech.org/?node=research\u0026article_id=00088-07022005"
      },
      {
        "trust": 0.8,
        "url": "http://www.gulftech.org/?node=research\u0026article_id=00087-07012005"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/14088"
      },
      {
        "trust": 0.8,
        "url": "http://www.frsirt.com/english/advisories/2008/0560"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0226"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/28419/"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/28324/"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0226"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0227"
      },
      {
        "trust": 0.3,
        "url": "http://yassl.com/"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/485810"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/485811"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2006-7232"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2007-2692"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2007-6303"
      },
      {
        "trust": 0.2,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/119.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/./dsa-1478"
      },
      {
        "trust": 0.1,
        "url": "https://www.exploit-db.com/exploits/16849/"
      },
      {
        "trust": 0.1,
        "url": "https://www.rapid7.com/db/modules/exploit/linux/mysql/mysql_yassl_hello"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/588-2/"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0227"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/advisories"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2079"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-2079"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.24a-9ubuntu2.4_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.45-1ubuntu3.3.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.8_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.45.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.38-0ubuntu1.4_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.8_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.38-0ubuntu1.4_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.24a-9ubuntu2.4_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.38-0ubuntu1.4_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.8_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.38-0ubuntu1.4_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.38-0ubuntu1.4_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.8_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.45-1ubuntu3.3.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.38-0ubuntu1.4_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.24a-9ubuntu2.4.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.8_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.8_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.38-0ubuntu1.4_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.45-1ubuntu3.3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.45-1ubuntu3.3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.24a-9ubuntu2.4_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.45-1ubuntu3.3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.45-1ubuntu3.3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.24a-9ubuntu2.4_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.38-0ubuntu1.4_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.24a-9ubuntu2.4_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.38-0ubuntu1.4_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.38-0ubuntu1.4.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.8_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.24a.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.8_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.45-1ubuntu3.3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.24a-9ubuntu2.4_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.24a-9ubuntu2.4.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.38-0ubuntu1.4.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.38-0ubuntu1.4_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.24a-9ubuntu2.4_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.38-0ubuntu1.4_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.8_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.24a-9ubuntu2.4_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.8_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.24a-9ubuntu2.4_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.8_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.24a-9ubuntu2.4_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.45-1ubuntu3.3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.8_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.45-1ubuntu3.3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.45-1ubuntu3.3_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.45-1ubuntu3.3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.45-1ubuntu3.3_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.24a-9ubuntu2.4_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.24a-9ubuntu2.4_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.45-1ubuntu3.3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.38-0ubuntu1.4_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.45-1ubuntu3.3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.24a-9ubuntu2.4_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.24a-9ubuntu2.4_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.45-1ubuntu3.3_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.8_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.8.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.38-0ubuntu1.4_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.38-0ubuntu1.4_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.8_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.38-0ubuntu1.4_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.38-0ubuntu1.4_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.38.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.24a-9ubuntu2.4_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.8_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.45-1ubuntu3.3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.45-1ubuntu3.3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.24a-9ubuntu2.4_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.38-0ubuntu1.4_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.24a-9ubuntu2.4_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.45-1ubuntu3.3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.45-1ubuntu3.3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.8_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.8.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.38-0ubuntu1.4_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.45-1ubuntu3.3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.24a-9ubuntu2.4_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.8_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.38-0ubuntu1.4_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.24a-9ubuntu2.4_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.38-0ubuntu1.4_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.38-0ubuntu1.4_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.8_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.38-0ubuntu1.4_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.45-1ubuntu3.3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.38-0ubuntu1.4_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.8_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3699/"
      },
      {
        "trust": 0.1,
        "url": "http://sourceforge.net/project/showfiles.php?group_id=66479"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.9_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.9.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.9_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.9.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.9_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/bugs/209699"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-common_5.0.32-7etch5_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch5.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server_5.0.32-7etch5_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch5.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client_5.0.32-7etch5_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://packages.debian.org/\u003cpkg\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_arm.deb"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#442845"
      },
      {
        "db": "VULHUB",
        "id": "VHN-30351"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-0226"
      },
      {
        "db": "BID",
        "id": "27140"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001045"
      },
      {
        "db": "PACKETSTORM",
        "id": "68366"
      },
      {
        "db": "PACKETSTORM",
        "id": "64766"
      },
      {
        "db": "PACKETSTORM",
        "id": "38388"
      },
      {
        "db": "PACKETSTORM",
        "id": "65137"
      },
      {
        "db": "PACKETSTORM",
        "id": "63104"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-154"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0226"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#442845"
      },
      {
        "db": "VULHUB",
        "id": "VHN-30351"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-0226"
      },
      {
        "db": "BID",
        "id": "27140"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001045"
      },
      {
        "db": "PACKETSTORM",
        "id": "68366"
      },
      {
        "db": "PACKETSTORM",
        "id": "64766"
      },
      {
        "db": "PACKETSTORM",
        "id": "38388"
      },
      {
        "db": "PACKETSTORM",
        "id": "65137"
      },
      {
        "db": "PACKETSTORM",
        "id": "63104"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-154"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0226"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-07-06T00:00:00",
        "db": "CERT/CC",
        "id": "VU#442845"
      },
      {
        "date": "2008-01-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-30351"
      },
      {
        "date": "2008-01-10T00:00:00",
        "db": "VULMON",
        "id": "CVE-2008-0226"
      },
      {
        "date": "2008-01-04T00:00:00",
        "db": "BID",
        "id": "27140"
      },
      {
        "date": "2008-02-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-001045"
      },
      {
        "date": "2008-07-21T19:49:13",
        "db": "PACKETSTORM",
        "id": "68366"
      },
      {
        "date": "2008-03-20T20:58:07",
        "db": "PACKETSTORM",
        "id": "64766"
      },
      {
        "date": "2005-07-01T23:31:00",
        "db": "PACKETSTORM",
        "id": "38388"
      },
      {
        "date": "2008-04-03T05:44:58",
        "db": "PACKETSTORM",
        "id": "65137"
      },
      {
        "date": "2008-01-30T03:19:05",
        "db": "PACKETSTORM",
        "id": "63104"
      },
      {
        "date": "2007-10-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200801-154"
      },
      {
        "date": "2008-01-10T23:46:00",
        "db": "NVD",
        "id": "CVE-2008-0226"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-03-09T00:00:00",
        "db": "CERT/CC",
        "id": "VU#442845"
      },
      {
        "date": "2019-12-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-30351"
      },
      {
        "date": "2019-12-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2008-0226"
      },
      {
        "date": "2010-01-28T05:21:00",
        "db": "BID",
        "id": "27140"
      },
      {
        "date": "2010-02-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-001045"
      },
      {
        "date": "2019-12-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200801-154"
      },
      {
        "date": "2019-12-17T20:26:08.287000",
        "db": "NVD",
        "id": "CVE-2008-0226"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "68366"
      },
      {
        "db": "PACKETSTORM",
        "id": "64766"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-154"
      }
    ],
    "trust": 0.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple PHP XML-RPC implementations vulnerable to code injection",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#442845"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-154"
      }
    ],
    "trust": 0.6
  }
}