A
Admin
Guest
Security Advisory - RHSA-2003:281-08
------------------------------------------------------------------------------
Summary:
Updated MySQL packages fix vulnerability
Updated MySQL server packages fix a buffer overflow vulnerability.
Description:
MySQL is a multi-user, multi-threaded SQL database server.
Frank Denis reported a bug in unpatched versions of MySQL prior to version
3.23.58. Passwords for MySQL users are stored in the Password field of the
user table. Under this bug, a Password field with a value greater than 16
characters can cause a buffer overflow. It may be possible for an attacker
with the ability to modify the user table to exploit this buffer overflow
to execute arbitrary code as the MySQL user. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2003-0780 to
this issue.
Users of MySQL are advised to upgrade to these erratum packages containing
MySQL 3.23.58, which is not vulnerable to this issue.
References:
http://www.mysql.com/doc/en/News-3.23.58.html
http://www.mysql.com/doc/en/News-3.23.57.html
------------------------------------------------------------------------------
------------------------------------------------------------------------------
Summary:
Updated MySQL packages fix vulnerability
Updated MySQL server packages fix a buffer overflow vulnerability.
Description:
MySQL is a multi-user, multi-threaded SQL database server.
Frank Denis reported a bug in unpatched versions of MySQL prior to version
3.23.58. Passwords for MySQL users are stored in the Password field of the
user table. Under this bug, a Password field with a value greater than 16
characters can cause a buffer overflow. It may be possible for an attacker
with the ability to modify the user table to exploit this buffer overflow
to execute arbitrary code as the MySQL user. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2003-0780 to
this issue.
Users of MySQL are advised to upgrade to these erratum packages containing
MySQL 3.23.58, which is not vulnerable to this issue.
References:
http://www.mysql.com/doc/en/News-3.23.58.html
http://www.mysql.com/doc/en/News-3.23.57.html
------------------------------------------------------------------------------