Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

MySQL buffer overflow

Information

Severity

Severity

Critical

Family

Family

Gain a shell remotely

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

3 years ago

Summary

You are running a version of MySQL which is older than 4.0.21. MySQL is a database which runs on both Linux/BSD and Windows platform. This version is vulnerable to a length overflow within it's mysql_real_connect() function. The overflow is due to an error in the processing of a return Domain (DNS) record. An attacker, exploiting this flaw, would need to control a DNS server which would be queried by the MySQL server. A successful attack would give the attacker the ability to execute arbitrary code on the remote machine.

Solution

Solution

Upgrade to the latest version of MySQL 4.0.21 or newer

Common Vulnerabilities and Exposures (CVE)