CVE-2006-0903

MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html
http://bugs.mysql.com/bug.php?id=17667
http://rst.void.ru/papers/advisory39.txt
http://secunia.com/advisories/19034 Vendor Advisory
http://secunia.com/advisories/19502
http://secunia.com/advisories/19814
http://secunia.com/advisories/20241
http://secunia.com/advisories/20253
http://secunia.com/advisories/20333
http://secunia.com/advisories/20625
http://secunia.com/advisories/30351
http://securitytracker.com/id?1015693
http://www.debian.org/security/2006/dsa-1071
http://www.debian.org/security/2006/dsa-1073
http://www.debian.org/security/2006/dsa-1079
http://www.mandriva.com/security/advisories?name=MDKSA-2006:064
http://www.redhat.com/support/errata/RHSA-2006-0544.html
http://www.redhat.com/support/errata/RHSA-2007-0083.html
http://www.redhat.com/support/errata/RHSA-2008-0364.html
http://www.securityfocus.com/bid/16850
http://www.ubuntu.com/usn/usn-274-2
http://www.vupen.com/english/advisories/2006/0752
https://exchange.xforce.ibmcloud.com/vulnerabilities/24966
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915
https://usn.ubuntu.com/274-1/
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html
http://bugs.mysql.com/bug.php?id=17667
http://rst.void.ru/papers/advisory39.txt
http://secunia.com/advisories/19034 Vendor Advisory
http://secunia.com/advisories/19502
http://secunia.com/advisories/19814
http://secunia.com/advisories/20241
http://secunia.com/advisories/20253
http://secunia.com/advisories/20333
http://secunia.com/advisories/20625
http://secunia.com/advisories/30351
http://securitytracker.com/id?1015693
http://www.debian.org/security/2006/dsa-1071
http://www.debian.org/security/2006/dsa-1073
http://www.debian.org/security/2006/dsa-1079
http://www.mandriva.com/security/advisories?name=MDKSA-2006:064
http://www.redhat.com/support/errata/RHSA-2006-0544.html
http://www.redhat.com/support/errata/RHSA-2007-0083.html
http://www.redhat.com/support/errata/RHSA-2008-0364.html
http://www.securityfocus.com/bid/16850
http://www.ubuntu.com/usn/usn-274-2
http://www.vupen.com/english/advisories/2006/0752
https://exchange.xforce.ibmcloud.com/vulnerabilities/24966
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915
https://usn.ubuntu.com/274-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.0:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.12:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.13:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.15:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.16:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.17:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.19:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.20:beta:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.21:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.57:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*

History

21 Nov 2024, 00:07

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html - () http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html -
References () http://bugs.mysql.com/bug.php?id=17667 - () http://bugs.mysql.com/bug.php?id=17667 -
References () http://rst.void.ru/papers/advisory39.txt - () http://rst.void.ru/papers/advisory39.txt -
References () http://secunia.com/advisories/19034 - Vendor Advisory () http://secunia.com/advisories/19034 - Vendor Advisory
References () http://secunia.com/advisories/19502 - () http://secunia.com/advisories/19502 -
References () http://secunia.com/advisories/19814 - () http://secunia.com/advisories/19814 -
References () http://secunia.com/advisories/20241 - () http://secunia.com/advisories/20241 -
References () http://secunia.com/advisories/20253 - () http://secunia.com/advisories/20253 -
References () http://secunia.com/advisories/20333 - () http://secunia.com/advisories/20333 -
References () http://secunia.com/advisories/20625 - () http://secunia.com/advisories/20625 -
References () http://secunia.com/advisories/30351 - () http://secunia.com/advisories/30351 -
References () http://securitytracker.com/id?1015693 - () http://securitytracker.com/id?1015693 -
References () http://www.debian.org/security/2006/dsa-1071 - () http://www.debian.org/security/2006/dsa-1071 -
References () http://www.debian.org/security/2006/dsa-1073 - () http://www.debian.org/security/2006/dsa-1073 -
References () http://www.debian.org/security/2006/dsa-1079 - () http://www.debian.org/security/2006/dsa-1079 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:064 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:064 -
References () http://www.redhat.com/support/errata/RHSA-2006-0544.html - () http://www.redhat.com/support/errata/RHSA-2006-0544.html -
References () http://www.redhat.com/support/errata/RHSA-2007-0083.html - () http://www.redhat.com/support/errata/RHSA-2007-0083.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0364.html - () http://www.redhat.com/support/errata/RHSA-2008-0364.html -
References () http://www.securityfocus.com/bid/16850 - () http://www.securityfocus.com/bid/16850 -
References () http://www.ubuntu.com/usn/usn-274-2 - () http://www.ubuntu.com/usn/usn-274-2 -
References () http://www.vupen.com/english/advisories/2006/0752 - () http://www.vupen.com/english/advisories/2006/0752 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24966 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24966 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915 -
References () https://usn.ubuntu.com/274-1/ - () https://usn.ubuntu.com/274-1/ -

07 Nov 2023, 01:58

Type Values Removed Values Added
Summary MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query. MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.

Information

Published : 2006-02-27 23:02

Updated : 2024-11-21 00:07


NVD link : CVE-2006-0903

Mitre link : CVE-2006-0903

CVE.ORG link : CVE-2006-0903


JSON object : View

Products Affected

mysql

  • mysql

oracle

  • mysql