CVE-2006-3469
Severity CVSS v4.0:
Pending analysis
Type:
CWE-134
Format String Vulnerability
Publication date:
21/07/2006
Last modified:
03/04/2025
Description
Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message.
Impact
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694
- http://bugs.mysql.com/bug.php?id=20729
- http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html
- http://docs.info.apple.com/article.html?artnum=305214
- http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
- http://secunia.com/advisories/21147
- http://secunia.com/advisories/21366
- http://secunia.com/advisories/24479
- http://secunia.com/advisories/31226
- http://security.gentoo.org/glsa/glsa-200608-09.xml
- http://www.debian.org/security/2006/dsa-1112
- http://www.redhat.com/support/errata/RHSA-2008-0768.html
- http://www.securityfocus.com/bid/19032
- http://www.ubuntu.com/usn/usn-321-1
- http://www.us-cert.gov/cas/techalerts/TA07-072A.html
- http://www.vupen.com/english/advisories/2007/0930
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694
- http://bugs.mysql.com/bug.php?id=20729
- http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html
- http://docs.info.apple.com/article.html?artnum=305214
- http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
- http://secunia.com/advisories/21147
- http://secunia.com/advisories/21366
- http://secunia.com/advisories/24479
- http://secunia.com/advisories/31226
- http://security.gentoo.org/glsa/glsa-200608-09.xml
- http://www.debian.org/security/2006/dsa-1112
- http://www.redhat.com/support/errata/RHSA-2008-0768.html
- http://www.securityfocus.com/bid/19032
- http://www.ubuntu.com/usn/usn-321-1
- http://www.us-cert.gov/cas/techalerts/TA07-072A.html
- http://www.vupen.com/english/advisories/2007/0930
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827



