Bugzilla – Bug 116433
VUL-0: CVE-2005-2558: mysql stack-based bufferoverflow with long function names
Last modified: 2021-11-21 15:37:18 UTC
Hello Klaus, maybe we already fixed this... I'am not sure. (Nothing in bugzilla AFAICS) [-- Die folgenden Daten sind signiert --] Hi everybody! A while ago a MySQL buffer overflow with long function names was published (CAN-2005-2558). At that time the patch could not be found in BK, so if anybody is still looking for it: http://mysql.bkbits.net:8080/mysql-4.0/cset@428b981bg2iwh3CbGANDaF-W6DbttA Of course the backslash test is not required on Linux, just the buf array patch. HTH and have a nice weekend, Martin -- Martin Pitt http://www.piware.de Ubuntu Developer http://www.ubuntu.com Debian Developer http://www.debian.org [-- Ende der signierten Daten --]
Oops, got the wrong maintainer. :)
upgrading severity. if you can do SQL injection attacks yio could exploit this to gain access to the mysql database user.
Maintenance-Tracker-2236
fixed and submited for sles8, 9.0, 9.1, sles9, 9.2, 9.3 (stable and SL10 isn't vulnerable)
/work/src/done/PATCHINFO/patchinfo.mysql /work/src/done/PATCHINFO/patchinfo-box.mysql
Move out of the 10.0 bug queue, since it's not.
Created attachment 50148 [details] xx.c gcc -shared -o libxx.so -fPIC -O2 xx.c cp libxx.so /usr/lib (or lib64)
# mysql mysql> CREATE FUNCTION fooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo RETURNS STRING SONAME "libxx.so"; ERROR 2013 (HY000): Lost connection to MySQL server during query mysql> this should not happen. it should show a regular SQL error.
this apparently really requires a library providing this overlong symbol. this makes it mostly a "denial of service" problem, except when an attacker could inject libraries into the system standard search paths.
packages approved
CVE-2005-2558: CVSS v2 Base Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)