CVE-2006-1517
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/05/2006
Last modified:
03/04/2025
Description
sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939
- http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html
- http://docs.info.apple.com/article.html?artnum=305214
- http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
- http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
- http://secunia.com/advisories/19929
- http://secunia.com/advisories/20002
- http://secunia.com/advisories/20073
- http://secunia.com/advisories/20076
- http://secunia.com/advisories/20223
- http://secunia.com/advisories/20241
- http://secunia.com/advisories/20253
- http://secunia.com/advisories/20333
- http://secunia.com/advisories/20424
- http://secunia.com/advisories/20457
- http://secunia.com/advisories/20625
- http://secunia.com/advisories/20762
- http://secunia.com/advisories/24479
- http://secunia.com/advisories/29847
- http://securityreason.com/securityalert/839
- http://securitytracker.com/id?1016016=
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
- http://www.debian.org/security/2006/dsa-1071
- http://www.debian.org/security/2006/dsa-1073
- http://www.debian.org/security/2006/dsa-1079
- http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A084
- http://www.novell.com/linux/security/advisories/2006-06-02.html
- http://www.osvdb.org/25228
- http://www.redhat.com/support/errata/RHSA-2006-0544.html
- http://www.securityfocus.com/archive/1/432734/100/0/threaded
- http://www.securityfocus.com/archive/1/434164/100/0/threaded
- http://www.securityfocus.com/bid/17780
- http://www.trustix.org/errata/2006/0028
- http://www.us-cert.gov/cas/techalerts/TA07-072A.html
- http://www.vupen.com/english/advisories/2006/1633
- http://www.vupen.com/english/advisories/2007/0930
- http://www.vupen.com/english/advisories/2008/1326/references
- http://www.wisec.it/vulns.php?page=8
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26228
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036
- https://usn.ubuntu.com/283-1/
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939
- http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html
- http://docs.info.apple.com/article.html?artnum=305214
- http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
- http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
- http://secunia.com/advisories/19929
- http://secunia.com/advisories/20002
- http://secunia.com/advisories/20073
- http://secunia.com/advisories/20076
- http://secunia.com/advisories/20223
- http://secunia.com/advisories/20241
- http://secunia.com/advisories/20253
- http://secunia.com/advisories/20333
- http://secunia.com/advisories/20424
- http://secunia.com/advisories/20457
- http://secunia.com/advisories/20625
- http://secunia.com/advisories/20762
- http://secunia.com/advisories/24479
- http://secunia.com/advisories/29847
- http://securityreason.com/securityalert/839
- http://securitytracker.com/id?1016016=
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.599377
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
- http://www.debian.org/security/2006/dsa-1071
- http://www.debian.org/security/2006/dsa-1073
- http://www.debian.org/security/2006/dsa-1079
- http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A084
- http://www.novell.com/linux/security/advisories/2006-06-02.html
- http://www.osvdb.org/25228
- http://www.redhat.com/support/errata/RHSA-2006-0544.html
- http://www.securityfocus.com/archive/1/432734/100/0/threaded
- http://www.securityfocus.com/archive/1/434164/100/0/threaded
- http://www.securityfocus.com/bid/17780
- http://www.trustix.org/errata/2006/0028
- http://www.us-cert.gov/cas/techalerts/TA07-072A.html
- http://www.vupen.com/english/advisories/2006/1633
- http://www.vupen.com/english/advisories/2007/0930
- http://www.vupen.com/english/advisories/2008/1326/references
- http://www.wisec.it/vulns.php?page=8
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26228
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036
- https://usn.ubuntu.com/283-1/