FKIE_CVE-2002-1373

Vulnerability from fkie_nvd - Published: 2002-12-23 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Signed integer vulnerability in the COM_TABLE_DUMP package for MySQL 3.23.x before 3.23.54 allows remote attackers to cause a denial of service (crash or hang) in mysqld by causing large negative integers to be provided to a memcpy call.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555
cve@mitre.orghttp://marc.info/?l=bugtraq&m=103971644013961&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=104004857201968&w=2
cve@mitre.orghttp://security.e-matters.de/advisories/042002.htmlVendor Advisory
cve@mitre.orghttp://www.debian.org/security/2002/dsa-212
cve@mitre.orghttp://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2003_003_mysql.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2002-288.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2002-289.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-166.html
cve@mitre.orghttp://www.securityfocus.com/advisories/5269
cve@mitre.orghttp://www.securityfocus.com/bid/6368Patch, Vendor Advisory
cve@mitre.orghttp://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/10846
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=103971644013961&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=104004857201968&w=2
af854a3a-2127-422b-91ae-364da2661108http://security.e-matters.de/advisories/042002.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2002/dsa-212
af854a3a-2127-422b-91ae-364da2661108http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2003_003_mysql.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2002-288.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2002-289.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-166.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/5269
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/6368Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/10846
Impacted products
Vendor Product Version
oracle mysql 3.22.26
oracle mysql 3.22.27
oracle mysql 3.22.28
oracle mysql 3.22.29
oracle mysql 3.22.30
oracle mysql 3.22.32
oracle mysql 3.23.2
oracle mysql 3.23.3
oracle mysql 3.23.4
oracle mysql 3.23.5
oracle mysql 3.23.8
oracle mysql 3.23.9
oracle mysql 3.23.10
oracle mysql 3.23.23
oracle mysql 3.23.24
oracle mysql 3.23.25
oracle mysql 3.23.26
oracle mysql 3.23.27
oracle mysql 3.23.28
oracle mysql 3.23.29
oracle mysql 3.23.30
oracle mysql 3.23.31
oracle mysql 3.23.34
oracle mysql 3.23.36
oracle mysql 3.23.37
oracle mysql 3.23.38
oracle mysql 3.23.39
oracle mysql 3.23.40
oracle mysql 3.23.41
oracle mysql 3.23.42
oracle mysql 3.23.43
oracle mysql 3.23.44
oracle mysql 3.23.45
oracle mysql 3.23.46
oracle mysql 3.23.47
oracle mysql 3.23.48
oracle mysql 3.23.49
oracle mysql 3.23.50
oracle mysql 3.23.51
oracle mysql 3.23.52
oracle mysql 3.23.53
oracle mysql 3.23.53a
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.5a

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "C883DB55-0CAC-462A-912B-69E9E7E1C79C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "45AD5549-07DC-43DA-B277-D7BF16ABE4E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "787CB28C-74C6-4356-8AB3-4183CD941EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30459B9-0FAC-48DF-9601-AAD1A028846F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "86DC48D3-09F1-48BD-A783-0549D4D5E8B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "209E0C63-FC71-4E19-B3D5-BCB71A758252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Signed integer vulnerability in the COM_TABLE_DUMP package for MySQL 3.23.x before 3.23.54 allows remote attackers to cause a denial of service (crash or hang) in mysqld by causing large negative integers to be provided to a memcpy call."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de enteros con signo en el paquete COM_TABLE_DUMP de MySQL 3.23.x anteriores a 3.23.54 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda o cuelge) en mysqld proveyendo a una llamada a memcpy() con enteros negativos grandes."
    }
  ],
  "id": "CVE-2002-1373",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-12-23T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000555"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=103971644013961\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=104004857201968\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://security.e-matters.de/advisories/042002.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2002/dsa-212"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2003_003_mysql.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2002-288.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-289.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-166.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/advisories/5269"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/6368"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10846"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000555"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=103971644013961\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=104004857201968\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://security.e-matters.de/advisories/042002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2002/dsa-212"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2003_003_mysql.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2002-288.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-289.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-166.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/advisories/5269"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/6368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10846"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…