CVE-2002-0969
CVSS4.6
发布时间 :2002-10-11 00:00:00
修订时间 :2016-10-17 22:23:03
NMCOS    

[原文]Buffer overflow in MySQL daemon (mysqld) before 3.23.50, and 4.0 beta before 4.02, on the Win32 platform, allows local users to execute arbitrary code via a long "datadir" parameter in the my.ini initialization file, whose permissions on Windows allow Full Control to the Everyone group.


[CNNVD]MySQL DataDir参数本地缓冲区溢出漏洞(CNNVD-200210-259)

        Win32平台上MySQL守护程序(mysqld) 3.23.50之前版本以及4.0 beta 4.02之前版本存在缓冲区溢出漏洞。本地用户可以借助my.ini初始化文件中的超长"datadir"参数执行任意代码,该漏洞在Windows上的许可允许完全控制Everyone组群。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:mysql:mysql:4.0.1MySQL MySQL 4.0.1
cpe:/a:mysql:mysql:3.23.49MySQL MySQL 3.23.49
cpe:/a:mysql:mysql:4.0.0MySQL MySQL 4.0.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0969
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0969
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-259
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0004.html
(VENDOR_ADVISORY)  VULNWATCH  20021002 wp-02-0003: MySQL Locally Exploitable Buffer Overflow
http://marc.info/?l=bugtraq&m=103358628011935&w=2
(UNKNOWN)  BUGTRAQ  20021002 wp-02-0003: MySQL Locally Exploitable Buffer Overflow
http://www.iss.net/security_center/static/10243.php
(VENDOR_ADVISORY)  XF  mysql-myini-datadir-bo(10243)
http://www.mysql.com/documentation/mysql/bychapter/manual_News.html#News-3.23.x
(UNKNOWN)  CONFIRM  http://www.mysql.com/documentation/mysql/bychapter/manual_News.html#News-3.23.x
http://www.securityfocus.com/bid/5853
(UNKNOWN)  BID  5853
http://www.westpoint.ltd.uk/advisories/wp-02-0003.txt
(UNKNOWN)  MISC  http://www.westpoint.ltd.uk/advisories/wp-02-0003.txt

- 漏洞信息

MySQL DataDir参数本地缓冲区溢出漏洞
中危 缓冲区溢出
2002-10-11 00:00:00 2006-03-28 00:00:00
本地  
        Win32平台上MySQL守护程序(mysqld) 3.23.50之前版本以及4.0 beta 4.02之前版本存在缓冲区溢出漏洞。本地用户可以借助my.ini初始化文件中的超长"datadir"参数执行任意代码,该漏洞在Windows上的许可允许完全控制Everyone组群。

- 公告与补丁

        The vendor has address this issue in the latest versions of MySQL. Users are urged to upgrade to the latest version of MySQL:
        MySQL AB MySQL 3.23.49
        
        MySQL AB MySQL 4.0 .0
        
        MySQL AB MySQL 4.0.1
        

- 漏洞信息

9908
MySQL my.ini Initialization File datadir Parameter Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-10-01 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

MySQL DataDir Parameter Local Buffer Overflow Vulnerability
Boundary Condition Error 5853
No Yes
2002-10-02 12:00:00 2009-07-11 05:06:00
Discovery credited to Matt Moore.

- 受影响的程序版本

MySQL AB MySQL 4.0.1
MySQL AB MySQL 4.0 .0
MySQL AB MySQL 3.23.49
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ RedHat Linux 7.3 i686
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
MySQL AB MySQL 4.0.3
MySQL AB MySQL 4.0.2
MySQL AB MySQL 3.23.53
+ OpenPKG OpenPKG Current
+ Sun Cobalt Qube 3
MySQL AB MySQL 3.23.52
+ Conectiva Linux Enterprise Edition 1.0
+ Mandriva Linux Mandrake 9.0
+ OpenPKG OpenPKG 1.1
+ RedHat Linux 8.0 i386
+ RedHat Linux 8.0
+ S.u.S.E. Linux 8.1
+ Trustix Secure Linux 1.5
MySQL AB MySQL 3.23.51
MySQL AB MySQL 3.23.50

- 不受影响的程序版本

MySQL AB MySQL 4.0.3
MySQL AB MySQL 4.0.2
MySQL AB MySQL 3.23.53
+ OpenPKG OpenPKG Current
+ Sun Cobalt Qube 3
MySQL AB MySQL 3.23.52
+ Conectiva Linux Enterprise Edition 1.0
+ Mandriva Linux Mandrake 9.0
+ OpenPKG OpenPKG 1.1
+ RedHat Linux 8.0 i386
+ RedHat Linux 8.0
+ S.u.S.E. Linux 8.1
+ Trustix Secure Linux 1.5
MySQL AB MySQL 3.23.51
MySQL AB MySQL 3.23.50

- 漏洞讨论

A vulnerability has been discovered in MySQL.

By supplying an overly long parameter string, in a MySQL configuration file, it is possible to overflow a buffer, resulting in memory corruption.

By exploiting this issue, it may be possible for an attacker to execute arbitrary commands within the context of the SYSTEM user, which is the default process owner.

This vulnerability has been reported to affect MySQL for Windows. It is not known whether other operating environments are vulnerable to this issue.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

The vendor has address this issue in the latest versions of MySQL. Users are urged to upgrade to the latest version of MySQL:


MySQL AB MySQL 3.23.49

MySQL AB MySQL 4.0 .0

MySQL AB MySQL 4.0.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站