|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-2558: mysql stack-based bufferoverflow with long function names | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Thomas Biege <thomas> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Critical | ||
| Priority: | P5 - None | CC: | security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | CVE-2005-2558: CVSS v2 Base Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | xx.c | ||
|
Description
Thomas Biege
2005-09-12 07:04:09 UTC
Oops, got the wrong maintainer. :) upgrading severity. if you can do SQL injection attacks yio could exploit this to gain access to the mysql database user. Maintenance-Tracker-2236 fixed and submited for sles8, 9.0, 9.1, sles9, 9.2, 9.3 (stable and SL10 isn't vulnerable) /work/src/done/PATCHINFO/patchinfo.mysql /work/src/done/PATCHINFO/patchinfo-box.mysql Move out of the 10.0 bug queue, since it's not. Created attachment 50148 [details]
xx.c
gcc -shared -o libxx.so -fPIC -O2 xx.c
cp libxx.so /usr/lib (or lib64)
# mysql mysql> CREATE FUNCTION fooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo RETURNS STRING SONAME "libxx.so"; ERROR 2013 (HY000): Lost connection to MySQL server during query mysql> this should not happen. it should show a regular SQL error. this apparently really requires a library providing this overlong symbol. this makes it mostly a "denial of service" problem, except when an attacker could inject libraries into the system standard search paths. packages approved CVE-2005-2558: CVSS v2 Base Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P) |