MySQL IF Query Handling Remote Denial Of Service Vulnerability
MySQL is prone to a remote denial-of-service vulnerability because it fails to handle certain specially crafted queries.
An attacker can exploit this issue to crash the application, denying access to legitimate users.
NOTE: An attacker must be able to execute arbitrary SELECT statements against the database to exploit this issue. This may be through legitimate means or by exploiting other latent SQL-injection vulnerabilities.
Versions prior to 5.0.40 are vulnerable.
http://www.securityfocus.com/bid/23911/discuss
http://www.securityfocus.com/bid/24016/discuss
MySQL is prone to a remote denial-of-service vulnerability because it fails to handle certain specially crafted queries.
An attacker can exploit this issue to crash the application, denying access to legitimate users.
NOTE: An attacker must be able to execute arbitrary SELECT statements against the database to exploit this issue. This may be through legitimate means or by exploiting other latent SQL-injection vulnerabilities.
Versions prior to 5.0.40 are vulnerable.
http://www.securityfocus.com/bid/23911/discuss
MySQL Rename Table Function Access Validation Vulnerability
MySQL is prone to an access-validation vulnerability because it fails to perform adequate access control.
Attackers can exploit this issue to rename arbitrary tables. This could result in denial-of-service conditions and may aid in other attacks.
Versions of MySQL prior to 4.1.23, 5.0.42, and 5.1.18 are vulnerable.
MySQL is prone to an access-validation vulnerability because it fails to perform adequate access control.
Attackers can exploit this issue to rename arbitrary tables. This could result in denial-of-service conditions and may aid in other attacks.
Versions of MySQL prior to 4.1.23, 5.0.42, and 5.1.18 are vulnerable.
http://www.securityfocus.com/bid/24016/discuss
全站熱搜