FKIE_CVE-2007-6304
Vulnerability from fkie_nvd - Published: 2007-12-10 21:46 - Updated: 2025-04-09 00:30
Severity ?
Summary
The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mysql | mysql | 5.0.0 | |
| mysql | mysql | 5.0.1 | |
| mysql | mysql | 5.0.2 | |
| mysql | mysql | 5.0.3 | |
| mysql | mysql | 5.0.4 | |
| mysql | mysql | 5.0.5 | |
| mysql | mysql | 5.0.5.0.21 | |
| mysql | mysql | 5.0.10 | |
| mysql | mysql | 5.0.15 | |
| mysql | mysql | 5.0.16 | |
| mysql | mysql | 5.0.17 | |
| mysql | mysql | 5.0.20 | |
| mysql | mysql | 5.0.22.1.0.1 | |
| mysql | mysql | 5.0.24 | |
| oracle | mysql | 5.0.0 | |
| oracle | mysql | 5.0.3 | |
| oracle | mysql | 5.0.6 | |
| oracle | mysql | 5.0.7 | |
| oracle | mysql | 5.0.8 | |
| oracle | mysql | 5.0.9 | |
| oracle | mysql | 5.0.11 | |
| oracle | mysql | 5.0.12 | |
| oracle | mysql | 5.0.13 | |
| oracle | mysql | 5.0.14 | |
| oracle | mysql | 5.0.18 | |
| oracle | mysql | 5.0.19 | |
| oracle | mysql | 5.0.21 | |
| oracle | mysql | 5.0.22 | |
| oracle | mysql | 5.0.27 | |
| oracle | mysql | 5.0.33 | |
| oracle | mysql | 5.0.37 | |
| oracle | mysql | 5.0.41 | |
| oracle | mysql | 5.1.1 | |
| oracle | mysql | 5.1.2 | |
| oracle | mysql | 5.1.10 | |
| oracle | mysql | 5.1.11 | |
| oracle | mysql | 5.1.12 | |
| oracle | mysql | 5.1.13 | |
| oracle | mysql | 5.1.14 | |
| oracle | mysql | 5.1.15 | |
| oracle | mysql | 5.1.16 | |
| oracle | mysql | 5.1.17 | |
| oracle | mysql | 6.0.0 | |
| oracle | mysql | 6.0.1 | |
| oracle | mysql | 6.0.2 | |
| oracle | mysql | 6.0.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F48E7355-2D9A-454D-AE66-B0AE015E31A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E51BF67A-BAEC-48F8-9290-67C6C5B8442E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5C6A2F-DEAE-470D-8888-0E9076CCA0B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1C09231E-8759-4DFB-AA8D-17A1C6D43AC1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns."
},
{
"lang": "es",
"value": "El motor federated en MySQL versiones 5.0.x anteriores a 5.0.51a, versiones 5.1.x anteriores a 5.1.23 y versiones 6.0.x anteriores a 6.0.4, al realizar una determinada consulta SHOW TABLE STATUS, permite a los servidores MySQL remotos causar una denegaci\u00f3n de servicio (bloqueo del manejador de federated y bloqueo del demonio) por medio de una respuesta que carece del n\u00famero m\u00ednimo necesario de columnas."
}
],
"id": "CVE-2007-6304",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-12-10T21:46:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://bugs.mysql.com/bug.php?id=29801"
},
{
"source": "cve@mitre.org",
"url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html"
},
{
"source": "cve@mitre.org",
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
},
{
"source": "cve@mitre.org",
"url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.mysql.com/announce/502"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/42609"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28063"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28128"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28343"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28637"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28739"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28838"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29706"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200804-04.xml"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1019085"
},
{
"source": "cve@mitre.org",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2008/dsa-1451"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/26832"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/4198"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38990"
},
{
"source": "cve@mitre.org",
"url": "https://issues.rpath.com/browse/RPL-2187"
},
{
"source": "cve@mitre.org",
"url": "https://usn.ubuntu.com/559-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://bugs.mysql.com/bug.php?id=29801"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.mysql.com/announce/502"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/42609"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28063"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28128"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28343"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28637"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28739"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28838"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29706"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200804-04.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1019085"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1451"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/26832"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/4198"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38990"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-2187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/559-1/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "Not vulnerable. The MySQL versions as shipped in Red Hat Enterprise Linux 2.1, 3, and 4 do not support federated storage engine. The MySQL package as shipped in Red Hat Enterprise Linux 5, Red Hat Application Stack v1, and Red Hat Application Stack v2 are not compiled with support for federated storage engine.",
"lastModified": "2007-12-14T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…