Use-after-free vulnerability in the my_login function in DBD::mysql before 4.033_01 allows attackers to have unspecified impact by leveraging a call to mysql_errno after a failure of my_login.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2016/dsa-3635 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/07/25/13 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/07/27/1 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/92118 - | |
References | () https://blog.fuzzing-project.org/50-Use-after-free-in-my_login-function-of-DBDmysql-Perl-module.html - Third Party Advisory | |
References | () https://github.com/perl5-dbi/DBD-mysql/blob/4.033_01/Changes - Release Notes | |
References | () https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156 - Issue Tracking, Patch | |
References | () https://github.com/perl5-dbi/DBD-mysql/pull/45 - Issue Tracking, Patch | |
References | () https://security.gentoo.org/glsa/201701-51 - |
Information
Published : 2016-08-19 21:59
Updated : 2024-11-21 02:39
NVD link : CVE-2015-8949
Mitre link : CVE-2015-8949
CVE.ORG link : CVE-2015-8949
JSON object : View
Products Affected
debian
- debian_linux
dbd-mysql_project
- dbd-mysql
CWE
CWE-416
Use After Free