Vulnerabilidad en consulta SHOW TABLE STATUS en el motor federated en MySQL (CVE-2007-6304)
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
10/12/2007
Última modificación:
09/04/2025
Descripción
El motor federated en MySQL versiones 5.0.x anteriores a 5.0.51a, versiones 5.1.x anteriores a 5.1.23 y versiones 6.0.x anteriores a 6.0.4, al realizar una determinada consulta SHOW TABLE STATUS, permite a los servidores MySQL remotos causar una denegación de servicio (bloqueo del manejador de federated y bloqueo del demonio) por medio de una respuesta que carece del número mínimo necesario de columnas.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://bugs.mysql.com/bug.php?id=29801
- http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html
- http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html
- http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html
- http://lists.mysql.com/announce/502
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
- http://osvdb.org/42609
- http://secunia.com/advisories/28063
- http://secunia.com/advisories/28128
- http://secunia.com/advisories/28343
- http://secunia.com/advisories/28637
- http://secunia.com/advisories/28739
- http://secunia.com/advisories/28838
- http://secunia.com/advisories/29706
- http://security.gentoo.org/glsa/glsa-200804-04.xml
- http://securitytracker.com/id?1019085=
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040
- http://www.debian.org/security/2008/dsa-1451
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A017
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A028
- http://www.securityfocus.com/archive/1/487606/100/0/threaded
- http://www.securityfocus.com/bid/26832
- http://www.vupen.com/english/advisories/2007/4198
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38990
- https://issues.rpath.com/browse/RPL-2187
- https://usn.ubuntu.com/559-1/
- http://bugs.mysql.com/bug.php?id=29801
- http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html
- http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html
- http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html
- http://lists.mysql.com/announce/502
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
- http://osvdb.org/42609
- http://secunia.com/advisories/28063
- http://secunia.com/advisories/28128
- http://secunia.com/advisories/28343
- http://secunia.com/advisories/28637
- http://secunia.com/advisories/28739
- http://secunia.com/advisories/28838
- http://secunia.com/advisories/29706
- http://security.gentoo.org/glsa/glsa-200804-04.xml
- http://securitytracker.com/id?1019085=
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040
- http://www.debian.org/security/2008/dsa-1451
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A017
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A028
- http://www.securityfocus.com/archive/1/487606/100/0/threaded
- http://www.securityfocus.com/bid/26832
- http://www.vupen.com/english/advisories/2007/4198
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38990
- https://issues.rpath.com/browse/RPL-2187
- https://usn.ubuntu.com/559-1/