Korean
<< Back
VID 25036
Severity 40
Port 3306
Protocol TCP
Class DB
Detailed Description The MySQL Server, according to its version number, has a buffer overflow vulnerability in the mysql_real_connect function.
MySQL versions 4.0.20 and earlier could allow a remote attacker to execute arbitrary code, due to insufficient boundary checks performed by the 'mysql_real_connect' function. The 'mysql_real_connect' function does not verify the length of the IP address returned through a DNS response from a server. A remote attacker in control of a DNS server, can supply a malicious reverse DNS hostname lookup address to overflow a buffer and possibly execute arbitrary code on the affected host.

* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. Reportedly, this vulnerability can not be exploited on Linux and OpenBSD platforms.

* References:
http://bugs.mysql.com/bug.php?id=4017
http://secunia.com/advisories/12305/

* Platforms Affected:
MySQL 4.0.20 and earlier
Any operating system Any version (Except for Linux and OpenBSD platforms)
Recommendation Upgrade to the latest version of MySQL (4.0.21 or later), available from MySQL web site at http://dev.mysql.com/downloads/mysql/4.0.html
Related URL CVE-2004-0836 (CVE)
Related URL 10981 (SecurityFocus)
Related URL 17047 (ISS)