CVE-2006-1516

The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
References
Link Resource
http://bugs.debian.org/365938
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html Patch
http://docs.info.apple.com/article.html?artnum=305214
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
http://secunia.com/advisories/19929 Patch Vendor Advisory
http://secunia.com/advisories/20002
http://secunia.com/advisories/20073
http://secunia.com/advisories/20076
http://secunia.com/advisories/20223
http://secunia.com/advisories/20241
http://secunia.com/advisories/20253
http://secunia.com/advisories/20333
http://secunia.com/advisories/20424
http://secunia.com/advisories/20457
http://secunia.com/advisories/20625
http://secunia.com/advisories/20762
http://secunia.com/advisories/24479
http://secunia.com/advisories/29847
http://securityreason.com/securityalert/840
http://securitytracker.com/id?1016017 Patch
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
http://www.debian.org/security/2006/dsa-1071
http://www.debian.org/security/2006/dsa-1073
http://www.debian.org/security/2006/dsa-1079
http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:084
http://www.novell.com/linux/security/advisories/2006-06-02.html
http://www.redhat.com/support/errata/RHSA-2006-0544.html
http://www.securityfocus.com/archive/1/432733/100/0/threaded
http://www.securityfocus.com/archive/1/434164/100/0/threaded
http://www.securityfocus.com/bid/17780
http://www.trustix.org/errata/2006/0028
http://www.us-cert.gov/cas/techalerts/TA07-072A.html US Government Resource
http://www.vupen.com/english/advisories/2006/1633
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2008/1326/references
http://www.wisec.it/vulns.php?page=7 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26236
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918
https://usn.ubuntu.com/283-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*

History

No history.

Information

Published : 2006-05-05 12:46

Updated : 2023-12-10 10:28


NVD link : CVE-2006-1516

Mitre link : CVE-2006-1516

CVE.ORG link : CVE-2006-1516


JSON object : View

Products Affected

oracle

  • mysql

mysql

  • mysql