Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Published: 2006-07-10
Updated: 2024-11-21
Summary
Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called. NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon. Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability
Vulnerable Configurations
Part | Description | Count |
Application | Mysql | 12 |
Application | Oracle | 22 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Databases |
NASL id | MYSQL_5_0_23_OR_5_1_12.NASL |
description | The version of MySQL installed on the remote host is older than 5.0.23 or 5.1.12. As such, it reportedly is affected by an off-by-one buffer overflow. A local attacker could use this flaw to crash the service. Note that this vulnerability is disputed as the attacker needs extensive permissions to launch the attack. Such permissions allow him to disrupt the service. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 17831 |
published | 2012-01-18 |
reporter | This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/17831 |
title | MySQL < 5.0.23 / 5.1.12 Denial of Service |
Statements
contributor | Mark J Cox |
lastmodified | 2006-07-19 |
organization | Red Hat |
statement | We do not consider this issue to have security implications, and therefore have no plans to issue MySQL updates for Red Hat Enterprise Linux 2.1, 3, or 4 to correct this issue. |