CVE-2005-0709

MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit.
References
Link Resource
http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html Exploit
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
http://marc.info/?l=bugtraq&m=111066115808506&w=2
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
http://www.debian.org/security/2005/dsa-707 Patch
http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml Patch
http://www.mandriva.com/security/advisories?name=MDKSA-2005:060
http://www.novell.com/linux/security/advisories/2005_19_mysql.html Patch
http://www.redhat.com/support/errata/RHSA-2005-334.html
http://www.redhat.com/support/errata/RHSA-2005-348.html
http://www.securityfocus.com/bid/12781 Exploit Patch
http://www.trustix.org/errata/2005/0009/ Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479
https://usn.ubuntu.com/96-1/
http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html Exploit
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
http://marc.info/?l=bugtraq&m=111066115808506&w=2
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
http://www.debian.org/security/2005/dsa-707 Patch
http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml Patch
http://www.mandriva.com/security/advisories?name=MDKSA-2005:060
http://www.novell.com/linux/security/advisories/2005_19_mysql.html Patch
http://www.redhat.com/support/errata/RHSA-2005-334.html
http://www.redhat.com/support/errata/RHSA-2005-348.html
http://www.securityfocus.com/bid/12781 Exploit Patch
http://www.trustix.org/errata/2005/0009/ Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479
https://usn.ubuntu.com/96-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*

History

20 Nov 2024, 23:55

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html - Exploit () http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html - Exploit
References () http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html - () http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html -
References () http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html - () http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html -
References () http://marc.info/?l=bugtraq&m=111066115808506&w=2 - () http://marc.info/?l=bugtraq&m=111066115808506&w=2 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1 -
References () http://www.debian.org/security/2005/dsa-707 - Patch () http://www.debian.org/security/2005/dsa-707 - Patch
References () http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml - Patch () http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml - Patch
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:060 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:060 -
References () http://www.novell.com/linux/security/advisories/2005_19_mysql.html - Patch () http://www.novell.com/linux/security/advisories/2005_19_mysql.html - Patch
References () http://www.redhat.com/support/errata/RHSA-2005-334.html - () http://www.redhat.com/support/errata/RHSA-2005-334.html -
References () http://www.redhat.com/support/errata/RHSA-2005-348.html - () http://www.redhat.com/support/errata/RHSA-2005-348.html -
References () http://www.securityfocus.com/bid/12781 - Exploit, Patch () http://www.securityfocus.com/bid/12781 - Exploit, Patch
References () http://www.trustix.org/errata/2005/0009/ - Patch () http://www.trustix.org/errata/2005/0009/ - Patch
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479 -
References () https://usn.ubuntu.com/96-1/ - () https://usn.ubuntu.com/96-1/ -

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:55


NVD link : CVE-2005-0709

Mitre link : CVE-2005-0709

CVE.ORG link : CVE-2005-0709


JSON object : View

Products Affected

oracle

  • mysql

mysql

  • mysql
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')