Korean
<< Back
VID 25090
Severity 30
Port 3306
Protocol TCP
Class DB
Detailed Description A version of MySQL which is older than 5.1.47 is running on the host. MySQL versions 5.x prior to 5.1.47 are Multiple Vulnerabilities.

- The server may continue reading packets indefinitely if it receives a packet largers than the maximum size of one packet, which could allow an unauthenticated
remote attacker to consume a high level of CPU and bandwidth. (Bug #50974)

- Using an overly long table name argument to the 'COM_FIELD_LIST' command, an authenticated user can overflow a buffer and execute arbitrary code on the affected host. (Bug #53237)

- Using a specially crafted table name argument to 'COM_FIELD_LIST', an authenticated user can bypass almost all forms of checks for privileges and table- level grants. (Bug #53371)


* Note: This check solely relied on the banner of the remote MySQL server to assess this vulnerability, so this might be a false positive.

* References:
http://bugs.mysql.com/bug.php?id=50974
http://bugs.mysql.com/bug.php?id=53237
http://bugs.mysql.com/bug.php?id=53371
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html

* Platforms Affected:
MySQL versions 5.x prior to 5.1.47
Any operating system Any version
Recommendation Upgrade to the latest version of MySQL (5.1.47 or later), available from the MySQL Web site at http://www.mysql.com/
Related URL CVE-2010-1848,CVE-2010-1849,CVE-2010-1850 (CVE)
Related URL 40100,40106,40109 (SecurityFocus)
Related URL (ISS)