search menu icon-carat-right cmu-wordmark

CERT Coordination Center

MySQL monitor drop database command contains buffer overflow

Vulnerability Note VU#367320

Original Release Date: 2001-02-18 | Last Revised: 2001-02-18

Overview

MySQL is a popular open source database package. It contains a buffer overflow in the code that processes drop database commands.

Description

The MySQL server, mysqld, contains a buffer overflow in the code used to process drop database requests. By carefully crafting a MySQL drop database request, such as through the mysql client, an intruder may be able to execute arbitrary code with the privileges of the MySQL server. If a MySQL database is available over the internet (e.g. through mysqld or through a web page), a remote intruder may be able to exploit this vulnerability.

See also VU#123384.

Impact

Attackers able to authenticate to a MySQL database may be able to execute code with the privileges of the mysql server.

Solution

Upgrade to MySQL version 3.23.33 or later.

Vendor Information

367320
 
Affected   Unknown   Unaffected

MySQL

Updated:  February 17, 2001

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

This appears to have been addressed in MySQL version 3.23.33 and later as shown in http://www.mysql.com/doc/N/e/News-3.23.33.html.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

Our thanks to Joao Gouveia who discovered this vulnerability and posted it to the securityfocus.com BugTraq mailing list on February 9, 2001.

This document was written by Shawn V. Hernan.

Other Information

CVE IDs: None
Severity Metric: 17.72
Date Public: 2001-02-09
Date First Published: 2001-02-18
Date Last Updated: 2001-02-18 03:58 UTC
Document Revision: 9

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.