Rapid7 Vulnerability & Exploit Database

CESA-2003:282: mysql security update

Back to Search

CESA-2003:282: mysql security update

Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
09/22/2003
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated MySQL server packages fix a buffer overflow vulnerability.

MySQL is a multi-user, multi-threaded SQL database server. Frank Denis reported a bug in unpatched versions of MySQL prior to version 3.23.58. Passwords for MySQL users are stored in the Password field of the user table. Under this bug, a Password field with a value greater than 16 characters can cause a buffer overflow. It may be possible for an attacker with the ability to modify the user table to exploit this buffer overflow to execute arbitrary code as the MySQL user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0780 to this issue. Users of MySQL are advised to upgrade to these erratum packages containing MySQL 3.23.58, which is not vulnerable to this issue.

Solution(s)

  • centos-upgrade-mysql
  • centos-upgrade-mysql-devel
  • centos-upgrade-mysql-server

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;