CVE-2012-5612
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
03/12/2012
Last modified:
11/04/2025
Description
Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 5.1.0 (including) | 5.1.67 (excluding) |
| cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 5.2.0 (including) | 5.2.14 (excluding) |
| cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 5.3.0 (including) | 5.3.12 (excluding) |
| cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 5.5.0 (including) | 5.5.29 (excluding) |
| cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.5.0 (including) | 5.5.28 (including) |
| cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html
- http://seclists.org/fulldisclosure/2012/Dec/5
- http://secunia.com/advisories/53372
- http://security.gentoo.org/glsa/glsa-201308-06.xml
- http://www.exploit-db.com/exploits/23076
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A102
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A150
- http://www.openwall.com/lists/oss-security/2012/12/02/3
- http://www.openwall.com/lists/oss-security/2012/12/02/4
- http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
- http://www.ubuntu.com/usn/USN-1703-1
- https://mariadb.atlassian.net/browse/MDEV-3908
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16960
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html
- http://seclists.org/fulldisclosure/2012/Dec/5
- http://secunia.com/advisories/53372
- http://security.gentoo.org/glsa/glsa-201308-06.xml
- http://www.exploit-db.com/exploits/23076
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A102
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A150
- http://www.openwall.com/lists/oss-security/2012/12/02/3
- http://www.openwall.com/lists/oss-security/2012/12/02/4
- http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
- http://www.ubuntu.com/usn/USN-1703-1
- https://mariadb.atlassian.net/browse/MDEV-3908
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16960



