Hello.

Thank you for your contribution, but this issue has already been
discussed on this list (see the archive) and a fix is available (since
3.23.21).

Bye,

        Benjamin.



On Fri, Feb 02, 2001 at 01:23:26AM +0300, [EMAIL PROTECTED] wrote:
> >From Beyond-Security's SecuriTeam.com(The information has been provided by Tharbad):
> 
> A security vulnerability in MySQL, a database management system, has been 
>discovered. This vulnerability allows remote attackers to crash by issuing a SELECT 
>statement containing a large amount of characters. This crash is due to a buffer 
>overflow, and may enable the attacker to execute arbitrary code. The attacker would 
>need access to MySQL's query engine to exploit this, e.g. a valid username/password, 
>or an interface from which he can enter SQL select statements.
> 
> Vulnerable systems:
> MySQL version prior to 3.23.31
> 
> Immune systems:
> MySQL version 3.23.31 and above
> 
> Example:
> (You need a valid login/password to exploit this.)
> 
> # mysql -p -e 'select a.'`perl -e'printf("A"x130)'`'.b'
> Enter password:
> (hanged..^C)
> 
> Alternatively, the following method will work without requiring a password:
> # mysql -u --execute=

---------------------------------------------------------------------
Before posting, please check:
   http://www.mysql.com/manual.php   (the manual)
   http://lists.mysql.com/           (the list archive)

To request this thread, e-mail <[EMAIL PROTECTED]>
To unsubscribe, e-mail <[EMAIL PROTECTED]>
Trouble unsubscribing? Try: http://lists.mysql.com/php/unsubscribe.php

Reply via email to