MySQL COM_TABLE_DUMP buffer overflow

mysql-comtabledump-bo (26232) The risk level is classified as HighHigh Risk

Description:

MySQL is vulnerable to a buffer overflow, caused by improper handling of COM_TABLE_DUMP packets in the sql_base.cc file. By sending a specially-crafted COM_TABLE_DUMP packet, an authenticated remote attacker could overflow a buffer and execute arbitrary code on the system.


Consequences:

Gain Privileges

Remedy:

Upgrade to the latest version of MySQL (5.0.21 or later) available from the MySQL Web site. See References.

For SUSE Linux:
Refer to SUSE-SA:2006:036 for patch, upgrade, or suggested workaround information. See References.

For other distributions:
Contact your vendor for upgrade or patch information.

References:

  • BugTraq Mailing List, Tue May 02 2006 - 08:40:57 CDT: MySQL COM_TABLE_DUMP Information Leakage and Arbitrary command execution..
  • MySQL Web site: MySQL AB :: The world's most popular open source database.
  • BID-17780: MySQL Remote Information Disclosure and Buffer Overflow Vulnerabilities
  • CVE-2006-1518: Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values.
  • DSA-1071: mysql -- several vulnerabilities
  • DSA-1073: mysql-dfsg-4.1 -- several vulnerabilities
  • DSA-1079: mysql-dfsg -- several vulnerabilities
  • OSVDB ID: 25227: MySQL COM_TABLE_DUMP Packet Overflow
  • SA19929: MySQL Information Disclosure and Buffer Overflow Vulnerabilities
  • SECTRACK ID: 1016016: MySQL COM_TABLE_DUMP Processing Lets Remote Authenticated Users Execute Arbitrary Code or Obtain Information
  • SUSE-SA:2006:036: mysql remote code execution
  • SUSE-SR:2006:012: SUSE Security Summary Report
  • US-CERT VU#602457: MySQL fails to properly validate COM_TABLE_DUMP packets

Platforms Affected:

  • Debian Debian Linux 3.0
  • Debian Debian Linux 3.1
  • MySQL MySQL 5.0
  • MySQL MySQL 5.0.0 Alpha
  • MySQL MySQL 5.0.0.0
  • MySQL MySQL 5.0.1
  • MySQL MySQL 5.0.10
  • MySQL MySQL 5.0.11
  • MySQL MySQL 5.0.12
  • MySQL MySQL 5.0.13
  • MySQL MySQL 5.0.14
  • MySQL MySQL 5.0.15
  • MySQL MySQL 5.0.16
  • MySQL MySQL 5.0.17
  • MySQL MySQL 5.0.18
  • MySQL MySQL 5.0.19
  • MySQL MySQL 5.0.2
  • MySQL MySQL 5.0.3 Beta
  • MySQL MySQL 5.0.3
  • MySQL MySQL 5.0.4
  • MySQL MySQL 5.0.5
  • MySQL MySQL 5.0.6
  • MySQL MySQL 5.0.7
  • MySQL MySQL 5.0.8
  • MySQL MySQL 5.0.9
  • Novell UnitedLinux 1.0
  • SuSE Linux Enterprise Server 8
  • SUSE SuSE Linux 10.0
  • SUSE SuSE Linux 10.1
  • SUSE SuSE Linux 9.1
  • SUSE SuSE Linux 9.2
  • SUSE SuSE Linux 9.3
  • SuSE SuSE SLES 9

Reported:

May 03, 2006

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page