Vulnerabilities > CVE-2003-1331 - Buffer Overrun vulnerability in MySQL libmysqlclient Library mysql_real_connect()
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Stack-based buffer overflow in the mysql_real_connect function in the MySql client library (libmysqlclient) 4.0.13 and earlier allows local users to execute arbitrary code via a long socket name, a different vulnerability than CVE-2001-1453.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Nessus
NASL family | Databases |
NASL id | MYSQL_4_0_14.NASL |
description | The version of MySQL installed on the remote host is older than 4.0.14. The client library (libmysqlclient) is thus reportedly affected by a buffer overflow. A local attacker could execute arbitrary code through a long socket name. Note that RedHat does not consider that this flaw is a security issue. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 17822 |
published | 2012-01-18 |
reporter | This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/17822 |
title | MySQL < 4.0.14 libmysqlclient Buffer Overflow |
code |
|
Statements
contributor | Joshua Bressers |
lastmodified | 2007-06-29 |
organization | Red Hat |
statement | Red Hat does not consider this issue to be a security vulnerability since no trust boundary is crossed. The user must voluntarily interact with the attack mechanism to exploit this flaw, with the result being the ability to run code as themselves. |