CVE-2006-1518

Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 Patch
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html Patch
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
http://secunia.com/advisories/19929 Patch Vendor Advisory
http://secunia.com/advisories/20241
http://secunia.com/advisories/20253
http://secunia.com/advisories/20333
http://secunia.com/advisories/20457
http://secunia.com/advisories/20762
http://securityreason.com/securityalert/839
http://securitytracker.com/id?1016016 Patch
http://www.debian.org/security/2006/dsa-1071
http://www.debian.org/security/2006/dsa-1073
http://www.debian.org/security/2006/dsa-1079
http://www.kb.cert.org/vuls/id/602457 Patch Third Party Advisory US Government Resource
http://www.novell.com/linux/security/advisories/2006-06-02.html
http://www.securityfocus.com/archive/1/432734/100/0/threaded
http://www.securityfocus.com/bid/17780
http://www.vupen.com/english/advisories/2006/1633
http://www.wisec.it/vulns.php?page=8 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26232
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 Patch
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html Patch
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
http://secunia.com/advisories/19929 Patch Vendor Advisory
http://secunia.com/advisories/20241
http://secunia.com/advisories/20253
http://secunia.com/advisories/20333
http://secunia.com/advisories/20457
http://secunia.com/advisories/20762
http://securityreason.com/securityalert/839
http://securitytracker.com/id?1016016 Patch
http://www.debian.org/security/2006/dsa-1071
http://www.debian.org/security/2006/dsa-1073
http://www.debian.org/security/2006/dsa-1079
http://www.kb.cert.org/vuls/id/602457 Patch Third Party Advisory US Government Resource
http://www.novell.com/linux/security/advisories/2006-06-02.html
http://www.securityfocus.com/archive/1/432734/100/0/threaded
http://www.securityfocus.com/bid/17780
http://www.vupen.com/english/advisories/2006/1633
http://www.wisec.it/vulns.php?page=8 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26232
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*

History

21 Nov 2024, 00:09

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 - Patch () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 - Patch
References () http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html - Patch () http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html - Patch
References () http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html - () http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html -
References () http://secunia.com/advisories/19929 - Patch, Vendor Advisory () http://secunia.com/advisories/19929 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20241 - () http://secunia.com/advisories/20241 -
References () http://secunia.com/advisories/20253 - () http://secunia.com/advisories/20253 -
References () http://secunia.com/advisories/20333 - () http://secunia.com/advisories/20333 -
References () http://secunia.com/advisories/20457 - () http://secunia.com/advisories/20457 -
References () http://secunia.com/advisories/20762 - () http://secunia.com/advisories/20762 -
References () http://securityreason.com/securityalert/839 - () http://securityreason.com/securityalert/839 -
References () http://securitytracker.com/id?1016016 - Patch () http://securitytracker.com/id?1016016 - Patch
References () http://www.debian.org/security/2006/dsa-1071 - () http://www.debian.org/security/2006/dsa-1071 -
References () http://www.debian.org/security/2006/dsa-1073 - () http://www.debian.org/security/2006/dsa-1073 -
References () http://www.debian.org/security/2006/dsa-1079 - () http://www.debian.org/security/2006/dsa-1079 -
References () http://www.kb.cert.org/vuls/id/602457 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/602457 - Patch, Third Party Advisory, US Government Resource
References () http://www.novell.com/linux/security/advisories/2006-06-02.html - () http://www.novell.com/linux/security/advisories/2006-06-02.html -
References () http://www.securityfocus.com/archive/1/432734/100/0/threaded - () http://www.securityfocus.com/archive/1/432734/100/0/threaded -
References () http://www.securityfocus.com/bid/17780 - () http://www.securityfocus.com/bid/17780 -
References () http://www.vupen.com/english/advisories/2006/1633 - () http://www.vupen.com/english/advisories/2006/1633 -
References () http://www.wisec.it/vulns.php?page=8 - Patch () http://www.wisec.it/vulns.php?page=8 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26232 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26232 -

Information

Published : 2006-05-05 12:46

Updated : 2024-11-21 00:09


NVD link : CVE-2006-1518

Mitre link : CVE-2006-1518

CVE.ORG link : CVE-2006-1518


JSON object : View

Products Affected

oracle

  • mysql

mysql

  • mysql