Описание
sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-1517
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26228
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036
- https://usn.ubuntu.com/283-1
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939
- http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html
- http://docs.info.apple.com/article.html?artnum=305214
- http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
- http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
- http://secunia.com/advisories/19929
- http://secunia.com/advisories/20002
- http://secunia.com/advisories/20073
- http://secunia.com/advisories/20076
- http://secunia.com/advisories/20223
- http://secunia.com/advisories/20241
- http://secunia.com/advisories/20253
- http://secunia.com/advisories/20333
- http://secunia.com/advisories/20424
- http://secunia.com/advisories/20457
- http://secunia.com/advisories/20625
- http://secunia.com/advisories/20762
- http://secunia.com/advisories/24479
- http://secunia.com/advisories/29847
- http://securityreason.com/securityalert/839
- http://securitytracker.com/id?1016016
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
- http://www.debian.org/security/2006/dsa-1071
- http://www.debian.org/security/2006/dsa-1073
- http://www.debian.org/security/2006/dsa-1079
- http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:084
- http://www.novell.com/linux/security/advisories/2006-06-02.html
- http://www.osvdb.org/25228
- http://www.redhat.com/support/errata/RHSA-2006-0544.html
- http://www.securityfocus.com/archive/1/432734/100/0/threaded
- http://www.securityfocus.com/archive/1/434164/100/0/threaded
- http://www.securityfocus.com/bid/17780
- http://www.trustix.org/errata/2006/0028
- http://www.us-cert.gov/cas/techalerts/TA07-072A.html
- http://www.vupen.com/english/advisories/2006/1633
- http://www.vupen.com/english/advisories/2007/0930
- http://www.vupen.com/english/advisories/2008/1326/references
- http://www.wisec.it/vulns.php?page=8
EPSS
CVE ID
Связанные уязвимости
sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0. ...
EPSS