The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html | Patch Vendor Advisory |
http://marc.info/?l=bugtraq&m=108904917528205&w=2 | |
http://www.kb.cert.org/vuls/id/184030 | Patch Third Party Advisory US Government Resource |
http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html | Patch Vendor Advisory |
http://marc.info/?l=bugtraq&m=108904917528205&w=2 | |
http://www.kb.cert.org/vuls/id/184030 | Patch Third Party Advisory US Government Resource |
Configurations
History
20 Nov 2024, 23:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html - Patch, Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=108904917528205&w=2 - | |
References | () http://www.kb.cert.org/vuls/id/184030 - Patch, Third Party Advisory, US Government Resource |
Information
Published : 2004-12-06 05:00
Updated : 2024-11-20 23:49
NVD link : CVE-2004-0627
Mitre link : CVE-2004-0627
CVE.ORG link : CVE-2004-0627
JSON object : View
Products Affected
mysql
- mysql
CWE