Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/archive/1/432734/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://secunia.com/advisories/19929 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.wisec.it/vulns.php?page=8 | x_refsource_MISC x_transferred |
http://www.debian.org/security/2006/dsa-1079 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://www.vupen.com/english/advisories/2006/1633 | vdb-entry x_refsource_VUPEN x_transferred |
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html | vendor-advisory x_refsource_SUSE x_transferred |
http://securityreason.com/securityalert/839 | third-party-advisory x_refsource_SREASON x_transferred |
http://www.novell.com/linux/security/advisories/2006-06-02.html | vendor-advisory x_refsource_SUSE x_transferred |
http://www.securityfocus.com/bid/17780 | vdb-entry x_refsource_BID x_transferred |
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/20241 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/20762 | third-party-advisory x_refsource_SECUNIA x_transferred |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26232 | vdb-entry x_refsource_XF x_transferred |
http://secunia.com/advisories/20333 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 | x_refsource_CONFIRM x_transferred |
http://securitytracker.com/id?1016016 | vdb-entry x_refsource_SECTRACK x_transferred |
http://www.debian.org/security/2006/dsa-1071 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://secunia.com/advisories/20253 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/20457 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.debian.org/security/2006/dsa-1073 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://www.kb.cert.org/vuls/id/602457 | third-party-advisory x_refsource_CERT-VN x_transferred |
Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 6.5 | MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |