cve-2003-0780
Vulnerability from cvelistv5
Published
2003-09-12 04:00
Modified
2024-08-08 02:05
Severity ?
EPSS score ?
Summary
Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:05:12.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CLA-2003:743", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743" }, { "name": "RHSA-2003:282", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html" }, { "name": "MDKSA-2003:094", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094" }, { "name": "20030913 exploit for mysql -- [get_salt_from_password] problem", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2" }, { "name": "20030910 Buffer overflow in MySQL", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html" }, { "name": "DSA-381", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-381" }, { "name": "VU#516492", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/516492" }, { "name": "RHSA-2003:281", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html" }, { "name": "20030910 Buffer overflow in MySQL", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/337012" }, { "name": "9709", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/9709" }, { "name": "2003-0034", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CLA-2003:743", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743" }, { "name": "RHSA-2003:282", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html" }, { "name": "MDKSA-2003:094", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094" }, { "name": "20030913 exploit for mysql -- [get_salt_from_password] problem", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2" }, { "name": "20030910 Buffer overflow in MySQL", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html" }, { "name": "DSA-381", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-381" }, { "name": "VU#516492", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/516492" }, { "name": "RHSA-2003:281", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html" }, { "name": "20030910 Buffer overflow in MySQL", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/337012" }, { "name": "9709", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/9709" }, { "name": "2003-0034", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0780", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CLA-2003:743", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743" }, { "name": "RHSA-2003:282", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html" }, { "name": "MDKSA-2003:094", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094" }, { "name": "20030913 exploit for mysql -- [get_salt_from_password] problem", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2" }, { "name": "20030910 Buffer overflow in MySQL", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html" }, { "name": "DSA-381", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-381" }, { "name": "VU#516492", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/516492" }, { "name": "RHSA-2003:281", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html" }, { "name": "20030910 Buffer overflow in MySQL", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/337012" }, { "name": "9709", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/9709" }, { "name": "2003-0034", "refsource": "TRUSTIX", "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0780", "datePublished": "2003-09-12T04:00:00", "dateReserved": "2003-09-11T00:00:00", "dateUpdated": "2024-08-08T02:05:12.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFEDB808-A8D8-403E-9103-AB486C793EF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48DBBAC9-AA05-409F-82B2-A552A3417E45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"268CDE97-C837-482A-BB16-77662C45074C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E04B7CC-9E17-47AB-8923-A4DBD24119FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E441A8AB-8057-4C0F-A2D8-02CDB125B9CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0BE4B79-BF2A-4323-B337-62B388FCF9D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18E35942-7E70-468E-BA15-97CA5086C1B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCB886BB-EA7C-4618-9029-BB16A45A4301\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56EC4832-82D1-4E57-86DA-8918CA006723\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92A42D3C-2539-469A-81BD-8306CD7E1A12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8060F90A-968A-45EB-9CA2-E83E8D8F7BC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3BCEB43-67D4-4711-8C30-4D2D93159EDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"362893B4-9BC1-4584-ACD5-08878A19E3C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD940715-318E-44C1-8613-FEBFB8F1741A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"167130D3-2AD2-4B82-B805-6A0BA45C4DCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17187451-7715-464D-9C7B-3F949345CF2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BFFFBBE-E604-4BCB-A143-E26CD91C0B51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE3658E1-B451-4B8B-A21A-3D66359D21DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"041AD718-39A7-4B13-90C5-680743B1C982\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA2F4EA8-64A3-4E11-A6A3-5179738157D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"067774E4-0704-4F5D-9B46-4DE19FE51163\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD26FA75-C3C5-434C-9A82-E5F798A8E47C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C406CBD9-2656-4EC8-87FB-5E8A7F1D690F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA0C0EE5-B2AA-4862-B144-24733CC86A2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"536F109A-7932-4424-889E-02922D8B783D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"036AE068-C061-49B1-95D1-98A09A79EE25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7A83184-F554-42C0-8162-B484CBAD09D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC229C7C-BF4F-473B-BB01-BBD96CD06D4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9244622-781A-46AE-866D-0EDDE5323048\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA85DD18-19D9-4BF8-8420-DEA24AE44046\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"670C3F10-A811-43D0-B762-5791D41C8B78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F379312-B95D-4C9B-918F-6A57B12EB5A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C36F606D-59B6-4FA0-8785-3B14592FE9CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2681F9FF-5899-4EFA-85A3-CEAB4402C786\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11A503C5-F2B8-4AFF-80F9-E035BAA68F1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64B5AA62-1AFC-45E4-BC47-91BC852B3F0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50FC2146-5BC0-4CA6-8700-5877C01B777D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F79AFBCE-FFF7-4348-BE17-42A7978E17E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A3C056E-EEB9-4B95-A155-F71B80B9695D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EFB2D10-E255-4DD3-BF03-217803CDED24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"436D90B0-C839-4B9F-853D-51C34459A11F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3535453-E7DC-4561-BB35-32DFF78E451C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41BEAD26-ADDC-4FC6-A493-584315183936\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"153E8DFB-4197-4117-87C6-C0FBE3C05600\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"765BF98E-7AB1-45EA-9935-2C311E621211\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCDCB80C-60B8-468E-A689-2C9DFF1F51C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22408224-0634-4CC6-888F-892E9D932CE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B2646B4-593E-4AC9-8292-1AD805632DC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD959AEC-EE71-4E86-9AD0-ED6FF45AC848\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E30EC061-A04C-4402-91A0-B7E8DA9DBA5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D57E557-7F6D-4618-86AC-B10C08341900\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ECE1A40-0603-421E-BCCF-111EC3C2BCE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*\", \"matchCriteriaId\": \"B657610A-8EDB-407B-A81F-C3CDF2EF6ED3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EC10CD2-B9A3-46DD-839E-C7FB6647155F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4D5D4B9-B831-4DDD-8FDD-3D14F167822A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EC21395-4C78-4343-9452-578B24C2656D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21BC82AF-5E80-4AE4-A765-9D3725D9E5F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CF2E25B-8689-4396-9C2B-99EEF4AB02BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5032D74E-CC8D-4217-AEF0-98DCD1820AE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3340604-0D38-4494-847B-E9E8B0026A28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:conectiva:linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97177EF7-8FC4-4D4D-A8D9-3628AA0035FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:conectiva:linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD14661C-E3BE-44DF-BC8D-294322BF23EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4007B0D-9606-46BD-866A-7911BEA292BE\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de b\\u00fafer en get_salt_from_password de sql_acl.cc de MySQL 4.0.14 y anteriores, y 3.23.x, permite a atacantes ejecutar c\\u00f3digo arbitrario mediante un campo de contrase\\u00f1a largo.\"}]", "id": "CVE-2003-0780", "lastModified": "2024-11-20T23:45:30.510", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:C/I:C/A:C\", \"baseScore\": 9.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2003-09-22T04:00:00.000", "references": "[{\"url\": \"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/9709\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2003/dsa-381\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/516492\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2003:094\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2003-281.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2003-282.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/337012\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/9709\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2003/dsa-381\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/516492\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2003:094\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2003-281.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2003-282.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/337012\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2003-0780\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2003-09-22T04:00:00.000\",\"lastModified\":\"2024-11-20T23:45:30.510\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer en get_salt_from_password de sql_acl.cc de MySQL 4.0.14 y anteriores, y 3.23.x, permite a atacantes ejecutar c\u00f3digo arbitrario mediante un campo de contrase\u00f1a largo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFEDB808-A8D8-403E-9103-AB486C793EF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48DBBAC9-AA05-409F-82B2-A552A3417E45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"268CDE97-C837-482A-BB16-77662C45074C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E04B7CC-9E17-47AB-8923-A4DBD24119FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E441A8AB-8057-4C0F-A2D8-02CDB125B9CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0BE4B79-BF2A-4323-B337-62B388FCF9D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18E35942-7E70-468E-BA15-97CA5086C1B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCB886BB-EA7C-4618-9029-BB16A45A4301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56EC4832-82D1-4E57-86DA-8918CA006723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92A42D3C-2539-469A-81BD-8306CD7E1A12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8060F90A-968A-45EB-9CA2-E83E8D8F7BC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3BCEB43-67D4-4711-8C30-4D2D93159EDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"362893B4-9BC1-4584-ACD5-08878A19E3C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD940715-318E-44C1-8613-FEBFB8F1741A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"167130D3-2AD2-4B82-B805-6A0BA45C4DCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17187451-7715-464D-9C7B-3F949345CF2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BFFFBBE-E604-4BCB-A143-E26CD91C0B51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE3658E1-B451-4B8B-A21A-3D66359D21DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"041AD718-39A7-4B13-90C5-680743B1C982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2F4EA8-64A3-4E11-A6A3-5179738157D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067774E4-0704-4F5D-9B46-4DE19FE51163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD26FA75-C3C5-434C-9A82-E5F798A8E47C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C406CBD9-2656-4EC8-87FB-5E8A7F1D690F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA0C0EE5-B2AA-4862-B144-24733CC86A2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"536F109A-7932-4424-889E-02922D8B783D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036AE068-C061-49B1-95D1-98A09A79EE25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A83184-F554-42C0-8162-B484CBAD09D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC229C7C-BF4F-473B-BB01-BBD96CD06D4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9244622-781A-46AE-866D-0EDDE5323048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA85DD18-19D9-4BF8-8420-DEA24AE44046\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670C3F10-A811-43D0-B762-5791D41C8B78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F379312-B95D-4C9B-918F-6A57B12EB5A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C36F606D-59B6-4FA0-8785-3B14592FE9CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2681F9FF-5899-4EFA-85A3-CEAB4402C786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11A503C5-F2B8-4AFF-80F9-E035BAA68F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64B5AA62-1AFC-45E4-BC47-91BC852B3F0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50FC2146-5BC0-4CA6-8700-5877C01B777D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F79AFBCE-FFF7-4348-BE17-42A7978E17E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A3C056E-EEB9-4B95-A155-F71B80B9695D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EFB2D10-E255-4DD3-BF03-217803CDED24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"436D90B0-C839-4B9F-853D-51C34459A11F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3535453-E7DC-4561-BB35-32DFF78E451C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41BEAD26-ADDC-4FC6-A493-584315183936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"153E8DFB-4197-4117-87C6-C0FBE3C05600\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"765BF98E-7AB1-45EA-9935-2C311E621211\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDCB80C-60B8-468E-A689-2C9DFF1F51C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22408224-0634-4CC6-888F-892E9D932CE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B2646B4-593E-4AC9-8292-1AD805632DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD959AEC-EE71-4E86-9AD0-ED6FF45AC848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30EC061-A04C-4402-91A0-B7E8DA9DBA5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D57E557-7F6D-4618-86AC-B10C08341900\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECE1A40-0603-421E-BCCF-111EC3C2BCE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"B657610A-8EDB-407B-A81F-C3CDF2EF6ED3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC10CD2-B9A3-46DD-839E-C7FB6647155F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D5D4B9-B831-4DDD-8FDD-3D14F167822A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC21395-4C78-4343-9452-578B24C2656D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21BC82AF-5E80-4AE4-A765-9D3725D9E5F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF2E25B-8689-4396-9C2B-99EEF4AB02BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5032D74E-CC8D-4217-AEF0-98DCD1820AE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3340604-0D38-4494-847B-E9E8B0026A28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:conectiva:linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97177EF7-8FC4-4D4D-A8D9-3628AA0035FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:conectiva:linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD14661C-E3BE-44DF-BC8D-294322BF23EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4007B0D-9606-46BD-866A-7911BEA292BE\"}]}]}],\"references\":[{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/9709\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-381\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/516492\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:094\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-281.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-282.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/337012\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/9709\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-381\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/516492\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:094\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-281.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-282.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/337012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.