CVE-2006-1516

The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
References
Link Resource
http://bugs.debian.org/365938
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html Patch
http://docs.info.apple.com/article.html?artnum=305214
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
http://secunia.com/advisories/19929 Patch Vendor Advisory
http://secunia.com/advisories/20002
http://secunia.com/advisories/20073
http://secunia.com/advisories/20076
http://secunia.com/advisories/20223
http://secunia.com/advisories/20241
http://secunia.com/advisories/20253
http://secunia.com/advisories/20333
http://secunia.com/advisories/20424
http://secunia.com/advisories/20457
http://secunia.com/advisories/20625
http://secunia.com/advisories/20762
http://secunia.com/advisories/24479
http://secunia.com/advisories/29847
http://securityreason.com/securityalert/840
http://securitytracker.com/id?1016017 Patch
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
http://www.debian.org/security/2006/dsa-1071
http://www.debian.org/security/2006/dsa-1073
http://www.debian.org/security/2006/dsa-1079
http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:084
http://www.novell.com/linux/security/advisories/2006-06-02.html
http://www.redhat.com/support/errata/RHSA-2006-0544.html
http://www.securityfocus.com/archive/1/432733/100/0/threaded
http://www.securityfocus.com/archive/1/434164/100/0/threaded
http://www.securityfocus.com/bid/17780
http://www.trustix.org/errata/2006/0028
http://www.us-cert.gov/cas/techalerts/TA07-072A.html US Government Resource
http://www.vupen.com/english/advisories/2006/1633
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2008/1326/references
http://www.wisec.it/vulns.php?page=7 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26236
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918
https://usn.ubuntu.com/283-1/
http://bugs.debian.org/365938
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html Patch
http://docs.info.apple.com/article.html?artnum=305214
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
http://secunia.com/advisories/19929 Patch Vendor Advisory
http://secunia.com/advisories/20002
http://secunia.com/advisories/20073
http://secunia.com/advisories/20076
http://secunia.com/advisories/20223
http://secunia.com/advisories/20241
http://secunia.com/advisories/20253
http://secunia.com/advisories/20333
http://secunia.com/advisories/20424
http://secunia.com/advisories/20457
http://secunia.com/advisories/20625
http://secunia.com/advisories/20762
http://secunia.com/advisories/24479
http://secunia.com/advisories/29847
http://securityreason.com/securityalert/840
http://securitytracker.com/id?1016017 Patch
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
http://www.debian.org/security/2006/dsa-1071
http://www.debian.org/security/2006/dsa-1073
http://www.debian.org/security/2006/dsa-1079
http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:084
http://www.novell.com/linux/security/advisories/2006-06-02.html
http://www.redhat.com/support/errata/RHSA-2006-0544.html
http://www.securityfocus.com/archive/1/432733/100/0/threaded
http://www.securityfocus.com/archive/1/434164/100/0/threaded
http://www.securityfocus.com/bid/17780
http://www.trustix.org/errata/2006/0028
http://www.us-cert.gov/cas/techalerts/TA07-072A.html US Government Resource
http://www.vupen.com/english/advisories/2006/1633
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2008/1326/references
http://www.wisec.it/vulns.php?page=7 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26236
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918
https://usn.ubuntu.com/283-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*

History

21 Nov 2024, 00:09

Type Values Removed Values Added
References () http://bugs.debian.org/365938 - () http://bugs.debian.org/365938 -
References () http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html - Patch () http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html - Patch
References () http://docs.info.apple.com/article.html?artnum=305214 - () http://docs.info.apple.com/article.html?artnum=305214 -
References () http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html - () http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html -
References () http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html - () http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html -
References () http://secunia.com/advisories/19929 - Patch, Vendor Advisory () http://secunia.com/advisories/19929 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20002 - () http://secunia.com/advisories/20002 -
References () http://secunia.com/advisories/20073 - () http://secunia.com/advisories/20073 -
References () http://secunia.com/advisories/20076 - () http://secunia.com/advisories/20076 -
References () http://secunia.com/advisories/20223 - () http://secunia.com/advisories/20223 -
References () http://secunia.com/advisories/20241 - () http://secunia.com/advisories/20241 -
References () http://secunia.com/advisories/20253 - () http://secunia.com/advisories/20253 -
References () http://secunia.com/advisories/20333 - () http://secunia.com/advisories/20333 -
References () http://secunia.com/advisories/20424 - () http://secunia.com/advisories/20424 -
References () http://secunia.com/advisories/20457 - () http://secunia.com/advisories/20457 -
References () http://secunia.com/advisories/20625 - () http://secunia.com/advisories/20625 -
References () http://secunia.com/advisories/20762 - () http://secunia.com/advisories/20762 -
References () http://secunia.com/advisories/24479 - () http://secunia.com/advisories/24479 -
References () http://secunia.com/advisories/29847 - () http://secunia.com/advisories/29847 -
References () http://securityreason.com/securityalert/840 - () http://securityreason.com/securityalert/840 -
References () http://securitytracker.com/id?1016017 - Patch () http://securitytracker.com/id?1016017 - Patch
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1 -
References () http://www.debian.org/security/2006/dsa-1071 - () http://www.debian.org/security/2006/dsa-1071 -
References () http://www.debian.org/security/2006/dsa-1073 - () http://www.debian.org/security/2006/dsa-1073 -
References () http://www.debian.org/security/2006/dsa-1079 - () http://www.debian.org/security/2006/dsa-1079 -
References () http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml - () http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:084 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:084 -
References () http://www.novell.com/linux/security/advisories/2006-06-02.html - () http://www.novell.com/linux/security/advisories/2006-06-02.html -
References () http://www.redhat.com/support/errata/RHSA-2006-0544.html - () http://www.redhat.com/support/errata/RHSA-2006-0544.html -
References () http://www.securityfocus.com/archive/1/432733/100/0/threaded - () http://www.securityfocus.com/archive/1/432733/100/0/threaded -
References () http://www.securityfocus.com/archive/1/434164/100/0/threaded - () http://www.securityfocus.com/archive/1/434164/100/0/threaded -
References () http://www.securityfocus.com/bid/17780 - () http://www.securityfocus.com/bid/17780 -
References () http://www.trustix.org/errata/2006/0028 - () http://www.trustix.org/errata/2006/0028 -
References () http://www.us-cert.gov/cas/techalerts/TA07-072A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-072A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/1633 - () http://www.vupen.com/english/advisories/2006/1633 -
References () http://www.vupen.com/english/advisories/2007/0930 - () http://www.vupen.com/english/advisories/2007/0930 -
References () http://www.vupen.com/english/advisories/2008/1326/references - () http://www.vupen.com/english/advisories/2008/1326/references -
References () http://www.wisec.it/vulns.php?page=7 - Patch () http://www.wisec.it/vulns.php?page=7 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26236 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26236 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918 -
References () https://usn.ubuntu.com/283-1/ - () https://usn.ubuntu.com/283-1/ -

Information

Published : 2006-05-05 12:46

Updated : 2024-11-21 00:09


NVD link : CVE-2006-1516

Mitre link : CVE-2006-1516

CVE.ORG link : CVE-2006-1516


JSON object : View

Products Affected

mysql

  • mysql

oracle

  • mysql