Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8q78-357r-r6m7

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.

The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.

Ссылки

EPSS

Процентиль: 98%
0.622
Средний

Связанные уязвимости

ubuntu
больше 19 лет назад

The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.

redhat
больше 19 лет назад

The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.

nvd
больше 19 лет назад

The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.

debian
больше 19 лет назад

The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0 ...

EPSS

Процентиль: 98%
0.622
Средний