search menu icon-carat-right cmu-wordmark

CERT Coordination Center

MySQL fails to properly handle overly long "scramble" values

Vulnerability Note VU#645326

Original Release Date: 2004-07-12 | Last Revised: 2004-07-21


There is a buffer overflow vulnerability in the way MySQL handles overly long "scramble" strings, which could allow an attacker to cause a denial of service or potentially execute arbitrary code.


MySQL is an open-source database system available for Microsoft Windows, Linux, and other UNIX-based operating systems. There is a vulnerability in MySQL in which an overly long "scramble" string generated by the my_rnd() function could cause a buffer overflow to occur. It has been reported that versions 4.1 prior to 4.1.3 and version 5.0 are affected.


A remote, unauthenticated attacker could cause a denial of service or potentially execute code of the attacker's choice.



According to the NGSSoftware Security Advisory, this vulnerability has been fixed in version 4.1.3 (Beta) and version 5.0 (Alpha).

Note: Users should exercise caution before installing beta or alpha releases.

Restrict access

Block or restrict access to the MySQL service (typically 3306/tcp) from untrusted networks such as the Internet.

Vendor Information


MySQL Affected

Updated:  July 12, 2004



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



This vulnerability was reported by Chris Anley of NGSSoftware.

This document was written by Damon Morda.

Other Information

CVE IDs: CVE-2004-0628
Severity Metric: 2.23
Date Public: 2004-07-01
Date First Published: 2004-07-12
Date Last Updated: 2004-07-21 18:13 UTC
Document Revision: 15

Sponsored by CISA.