Vulnerabilities > CVE-2006-3486 - Numeric Errors vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called. NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon. Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability

Common Weakness Enumeration (CWE)

Nessus

NASL familyDatabases
NASL idMYSQL_5_0_23_OR_5_1_12.NASL
descriptionThe version of MySQL installed on the remote host is older than 5.0.23 or 5.1.12. As such, it reportedly is affected by an off-by-one buffer overflow. A local attacker could use this flaw to crash the service. Note that this vulnerability is disputed as the attacker needs extensive permissions to launch the attack. Such permissions allow him to disrupt the service.
last seen2020-06-01
modified2020-06-02
plugin id17831
published2012-01-18
reporterThis script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/17831
titleMySQL < 5.0.23 / 5.1.12 Denial of Service

Statements

contributorMark J Cox
lastmodified2006-07-19
organizationRed Hat
statementWe do not consider this issue to have security implications, and therefore have no plans to issue MySQL updates for Red Hat Enterprise Linux 2.1, 3, or 4 to correct this issue.