Vulnerability Note VU#184030
MySQL fails to properly evaluate zero-length strings in the check_scramble_323() function
There is a vulnerability in the password authentication mechanism of MySQL which could allow an attacker to bypass authentication by supplying a zero-length string.
MySQL is an open-source database system available for Microsoft Windows, Linux, and other UNIX-based operating systems. There is a vulnerability in the check_scramble_323() function that could allow an attacker to bypass authentication by supplying a "passwd_len" value of NULL. It has been reported that versions 4.1 prior to 4.1.3 and version 5.0 are affected.
Note: In order to exploit this vulnerability, an attacker would have to use a modified MySQL client library.
A remote, unauthenticated attacker with network access to the MySQL server could successfully authenticate without knowledge of the user's password.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|MySQL||Affected||-||12 Jul 2004|
CVSS Metrics (Learn More)
This vulnerability was reported by Chris Anley of NGSSoftware.
This document was written by Damon Morda.
- CVE IDs: CAN-2004-0627
- Date Public: 01 Jul 2004
- Date First Published: 12 Jul 2004
- Date Last Updated: 12 Jul 2004
- Severity Metric: 5.74
- Document Revision: 26
If you have feedback, comments, or additional information about this vulnerability, please send us email.