Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2006-1516
PUBLISHED
More InfoOfficial Page
Assigner-debian
Assigner Org ID-79363d38-fa19-49d1-9214-5f28da3f3ac5
View Known Exploited Vulnerability (KEV) details
Published At-05 May, 2006 | 10:00
Updated At-07 Aug, 2024 | 17:12
Rejected At-
▼CVE Numbering Authority (CNA)

The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.trustix.org/errata/2006/0028
vendor-advisory
x_refsource_TRUSTIX
http://secunia.com/advisories/19929
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/20073
third-party-advisory
x_refsource_SECUNIA
http://bugs.debian.org/365938
x_refsource_CONFIRM
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
third-party-advisory
x_refsource_CERT
http://www.debian.org/security/2006/dsa-1079
vendor-advisory
x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2006/1633
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/archive/1/434164/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/20424
third-party-advisory
x_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
vendor-advisory
x_refsource_GENTOO
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
vendor-advisory
x_refsource_APPLE
http://securityreason.com/securityalert/840
third-party-advisory
x_refsource_SREASON
http://docs.info.apple.com/article.html?artnum=305214
x_refsource_CONFIRM
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
vendor-advisory
x_refsource_SUSE
http://www.novell.com/linux/security/advisories/2006-06-02.html
vendor-advisory
x_refsource_SUSE
http://www.securityfocus.com/bid/17780
vdb-entry
x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDKSA-2006:084
vendor-advisory
x_refsource_MANDRIVA
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html
x_refsource_CONFIRM
http://secunia.com/advisories/20241
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/20762
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26236
vdb-entry
x_refsource_XF
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
vendor-advisory
x_refsource_SUNALERT
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
vendor-advisory
x_refsource_SLACKWARE
http://secunia.com/advisories/20333
third-party-advisory
x_refsource_SECUNIA
http://securitytracker.com/id?1016017
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/20002
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/20223
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/20076
third-party-advisory
x_refsource_SECUNIA
http://www.wisec.it/vulns.php?page=7
x_refsource_MISC
http://www.debian.org/security/2006/dsa-1071
vendor-advisory
x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/1326/references
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/0930
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/archive/1/432733/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/20253
third-party-advisory
x_refsource_SECUNIA
https://usn.ubuntu.com/283-1/
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/20457
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1073
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/29847
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/20625
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-0544.html
vendor-advisory
x_refsource_REDHAT
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/24479
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.trustix.org/errata/2006/0028
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://secunia.com/advisories/19929
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/20073
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://bugs.debian.org/365938
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://www.debian.org/security/2006/dsa-1079
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vupen.com/english/advisories/2006/1633
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/archive/1/434164/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/20424
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://securityreason.com/securityalert/840
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://docs.info.apple.com/article.html?artnum=305214
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.novell.com/linux/security/advisories/2006-06-02.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.securityfocus.com/bid/17780
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:084
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/20241
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/20762
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/26236
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://secunia.com/advisories/20333
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://securitytracker.com/id?1016017
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/20002
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/20223
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/20076
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.wisec.it/vulns.php?page=7
Resource:
x_refsource_MISC
Hyperlink: http://www.debian.org/security/2006/dsa-1071
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vupen.com/english/advisories/2008/1326/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2007/0930
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/archive/1/432733/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/20253
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://usn.ubuntu.com/283-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/20457
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2006/dsa-1073
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/29847
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/20625
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0544.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/24479
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.trustix.org/errata/2006/0028
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://secunia.com/advisories/19929
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/20073
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://bugs.debian.org/365938
x_refsource_CONFIRM
x_transferred
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://www.debian.org/security/2006/dsa-1079
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vupen.com/english/advisories/2006/1633
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/archive/1/434164/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/20424
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://securityreason.com/securityalert/840
third-party-advisory
x_refsource_SREASON
x_transferred
http://docs.info.apple.com/article.html?artnum=305214
x_refsource_CONFIRM
x_transferred
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.novell.com/linux/security/advisories/2006-06-02.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.securityfocus.com/bid/17780
vdb-entry
x_refsource_BID
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:084
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/20241
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/20762
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/26236
vdb-entry
x_refsource_XF
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://secunia.com/advisories/20333
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://securitytracker.com/id?1016017
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/20002
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/20223
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/20076
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.wisec.it/vulns.php?page=7
x_refsource_MISC
x_transferred
http://www.debian.org/security/2006/dsa-1071
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vupen.com/english/advisories/2008/1326/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2007/0930
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/archive/1/432733/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/20253
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://usn.ubuntu.com/283-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/20457
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2006/dsa-1073
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/29847
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/20625
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0544.html
vendor-advisory
x_refsource_REDHAT
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/24479
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.trustix.org/errata/2006/0028
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://secunia.com/advisories/19929
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/20073
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://bugs.debian.org/365938
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1079
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/1633
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/434164/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/20424
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://securityreason.com/securityalert/840
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=305214
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006-06-02.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.securityfocus.com/bid/17780
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:084
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/20241
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/20762
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/26236
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://secunia.com/advisories/20333
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://securitytracker.com/id?1016017
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/20002
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/20223
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/20076
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.wisec.it/vulns.php?page=7
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1071
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1326/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/0930
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/432733/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/20253
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://usn.ubuntu.com/283-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/20457
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1073
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/29847
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/20625
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0544.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/24479
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Details not found