Vulnerability Note VU#645326
MySQL fails to properly handle overly long "scramble" values
There is a buffer overflow vulnerability in the way MySQL handles overly long "scramble" strings, which could allow an attacker to cause a denial of service or potentially execute arbitrary code.
MySQL is an open-source database system available for Microsoft Windows, Linux, and other UNIX-based operating systems. There is a vulnerability in MySQL in which an overly long "scramble" string generated by the my_rnd() function could cause a buffer overflow to occur. It has been reported that versions 4.1 prior to 4.1.3 and version 5.0 are affected.
A remote, unauthenticated attacker could cause a denial of service or potentially execute code of the attacker's choice.
According to the NGSSoftware Security Advisory, this vulnerability has been fixed in version 4.1.3 (Beta) and version 5.0 (Alpha).
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|MySQL||Affected||-||12 Jul 2004|
CVSS Metrics (Learn More)
This vulnerability was reported by Chris Anley of NGSSoftware.
This document was written by Damon Morda.
- CVE IDs: CAN-2004-0628
- Date Public: 01 Jul 2004
- Date First Published: 12 Jul 2004
- Date Last Updated: 21 Jul 2004
- Severity Metric: 2.23
- Document Revision: 15
If you have feedback, comments, or additional information about this vulnerability, please send us email.