Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Oracle MySQL Server Integer Overflow Vulnerability

Information

Severity

Severity

High

Family

Family

Databases

CVSSv2 Base

CVSSv2 Base

7.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

5 years ago

Modified

Modified

4 years ago

Summary

This host is installed with Oracle MySQL Server and is prone to integer overflow vulnerability.

Insight

Insight

Upon connection from a client, the server sends a greeting message and the client continues the communication by starting the authentication process. The authentication packet sent by the client contains a wealth of information including the client capabilities, username, password, etc. The packet is received by the server, and parsed by 'parse_client_handshake_packet()' function, in '/sql/auth/sql_authentication.cc'.

Affected Software

Affected Software

Oracle MySQL version 5.6.x branch up to 5.6.35 and 5.7.X branch up to 5.7.17

Detection Method

Detection Method

Send the crafted request and analyse the response to confirm the vulnerability.

Solution

Solution

Upgrade to MySQL 5.6.36, 5.7.18 or later.

Common Vulnerabilities and Exposures (CVE)