SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Database)  >   MySQL Vendors:   MySQL.com
MySQL Query Bug Lets Remote Users Bypass Query Logging
SecurityTracker Alert ID:  1015693
SecurityTracker URL:  http://securitytracker.com/id/1015693
CVE Reference:   CVE-2006-0903   (Links to External Site)
Updated:  Jun 9 2006
Original Entry Date:  Feb 28 2006
Impact:   Modification of user information
Exploit Included:  Yes  
Version(s): 5.0.18 and prior versions
Description:   A vulnerability was reported in MySQL. A remote user can bypass the logging of some query information.

A remote user can supply a specially crafted query containing a NULL symbol to cause the query to not be logged or to be improperly logged.

A demonstration exploit statement is provided:

mysql_query('/*'.chr(0).'*/ SELECT * FROM table');

1dt.w0lf reported this vulnerability.

The original advisory is available at:

http://rst.void.ru/papers/advisory39.txt

Impact:   A remote user can cause certain queries to not be properly logged.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.mysql.com/products/mysql/ (Links to External Site)
Cause:   Exception handling error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jun 11 2006 (Red Hat Issues Fix) MySQL Query Bug Lets Remote Users Bypass Query Logging
Red Hat has released a fix for Red Hat Enterprise Linux 4.
Feb 19 2007 (Red Hat Issues Fix) MySQL Query Bug Lets Remote Users Bypass Query Logging
Red Hat has released a fix for Red Hat Application Stack.
May 22 2008 (Red Hat Issues Fix) MySQL Query Bug Lets Remote Users Bypass Query Logging
Red Hat has released a fix for Red Hat Enterprise Linux 5.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC