|
Family: Databases --> Category: attack
MySQL Anonymous Login Handshake Information Leakage Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for anonymous login handshake info leakage in MySQL
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote database server is affected by an information disclosure
flaw.
Description :
The MySQL database server on the remote host reads from uninitialized
memory when processing a specially-crafted login packet. An
unauthenticated attacker may be able to exploit this flaw to obtain
sensitive information from the affected host as returned in an error
packet.
See also :
http://www.securityfocus.com/archive/1/432733/30/0/threaded
http://dev.mysql.com/doc/refman/4.1/en/news-4-0-27.html
http://dev.mysql.com/doc/refman/4.1/en/news-4-1-19.html
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-10.html
Solution :
Upgrade to MySQL 4.0.27 / 4.1.19 / 5.0.21 / 5.1.10 or later.
Threat Level:
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|