CVE-2005-2558
CVSS4.6
发布时间 :2005-08-16 00:00:00
修订时间 :2016-12-07 22:00:06
NMCOPS    

[原文]Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field.


[CNNVD]MySQL 缓冲区溢出漏洞(CNNVD-200508-134)

        MySQL是一款使用非常广泛的开放源代码关系数据库系统,拥有各种平台的运行版本。
        MySQL的init_syms()函数在将用户指定字符串拷贝到栈缓冲区时使用了不安全的字符串函数,导致攻击者可能利用此漏洞在主机上执行任意指令。
        由于没有正确的过滤这个缓冲区,攻击者可能溢出该缓冲区,覆盖部分栈。这允许攻击者在缓冲区末尾之外写入14个字节的任意数据和8字节的硬编码数据。
        CREATE FUNCTION语句格式如下:
        CREATE FUNCTION function_name RETURNS type SONAME "library_name"
        function_name字段的用户指定输入仅限于64个字符。如果操作系统成功的调用了这个库的话,控制就会交给init_syms()。这会试图将用户字符串拷贝到50个字节的缓冲区中,然后将硬编码字符串拷贝到用户字符串末尾。在一些早期版本的MySQL中,攻击者可以利用上述操作完全控制EIP,或将指定的数据拷贝到任意位置。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:mysql:mysql:4.0.21MySQL MySQL 4.0.21
cpe:/a:mysql:mysql:4.0.20MySQL MySQL 4.0.20
cpe:/a:mysql:mysql:5.0.0.0MySQL MySQL 5.0.0.0
cpe:/a:mysql:mysql:4.0.9:gammaMySQL MySQL 4.0.9 gamma
cpe:/a:mysql:mysql:4.0.11:gammaMySQL MySQL 4.0.11 gamma
cpe:/a:mysql:mysql:4.0.8:gammaMySQL MySQL 4.0.8 gamma
cpe:/a:mysql:mysql:4.0.24MySQL MySQL 4.0.24
cpe:/a:mysql:mysql:4.0.6MySQL MySQL 4.0.6
cpe:/a:mysql:mysql:4.1.5MySQL MySQL 4.1.5
cpe:/a:mysql:mysql:4.0.7MySQL MySQL 4.0.7
cpe:/a:mysql:mysql:4.0.4MySQL MySQL 4.0.4
cpe:/a:mysql:mysql:4.1.3MySQL MySQL 4.1.3
cpe:/a:mysql:mysql:4.0.5MySQL MySQL 4.0.5
cpe:/a:mysql:mysql:4.1.4MySQL MySQL 4.1.4
cpe:/a:mysql:mysql:4.0.2MySQL MySQL 4.0.2
cpe:/a:mysql:mysql:4.0.7:gammaMySQL MySQL 4.0.7 gamma
cpe:/a:mysql:mysql:4.0.3MySQL MySQL 4.0.3
cpe:/a:mysql:mysql:4.0.0MySQL MySQL 4.0.0
cpe:/a:mysql:mysql:4.0.1MySQL MySQL 4.0.1
cpe:/a:mysql:mysql:4.0.10MySQL MySQL 4.0.10
cpe:/a:mysql:mysql:4.1.0:alphaMySQL MySQL 4.1.0 alpha
cpe:/a:mysql:mysql:4.1.2:alphaMySQL MySQL 4.1.2 alpha
cpe:/a:mysql:mysql:5.0.2MySQL MySQL 5.0.2
cpe:/a:mysql:mysql:4.0.15MySQL MySQL 4.0.15
cpe:/a:mysql:mysql:4.1.3:betaMySQL MySQL 4.1.3 beta
cpe:/a:mysql:mysql:5.0.1MySQL MySQL 5.0.1
cpe:/a:mysql:mysql:4.0.18MySQL MySQL 4.0.18
cpe:/a:mysql:mysql:5.0.0:alphaMySQL MySQL 5.0.0 alpha
cpe:/a:mysql:mysql:4.0.12MySQL MySQL 4.0.12
cpe:/a:mysql:mysql:4.1.10aMySQL MySQL 4.1.10a
cpe:/a:mysql:mysql:4.0.11MySQL MySQL 4.0.11
cpe:/a:mysql:mysql:4.0.14MySQL MySQL 4.0.14
cpe:/a:mysql:mysql:4.0.8MySQL MySQL 4.0.8
cpe:/a:mysql:mysql:5.0.4MySQL MySQL 5.0.4
cpe:/a:mysql:mysql:4.0.13MySQL MySQL 4.0.13
cpe:/a:mysql:mysql:4.0.9MySQL MySQL 4.0.9
cpe:/a:mysql:mysql:5.0.3MySQL MySQL 5.0.3
cpe:/a:mysql:mysql:4.0.5aMySQL MySQL 4.0.5a
cpe:/a:mysql:mysql:4.1.0.0MySQL MySQL 4.1.0.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2558
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2558
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200508-134
(官方数据源) CNNVD

- 其它链接及资源

ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt
(UNKNOWN)  SCO  SCOSA-2006.18
http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html
(VENDOR_ADVISORY)  FULLDISC  20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions
http://marc.info/?l=bugtraq&m=112354450412427&w=2
(UNKNOWN)  BUGTRAQ  20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
(UNKNOWN)  SUNALERT  236703
http://www.appsecinc.com/resources/alerts/mysql/2005-002.html
(VENDOR_ADVISORY)  MISC  http://www.appsecinc.com/resources/alerts/mysql/2005-002.html
http://www.debian.org/security/2005/dsa-829
(UNKNOWN)  DEBIAN  DSA-829
http://www.debian.org/security/2005/dsa-831
(UNKNOWN)  DEBIAN  DSA-831
http://www.debian.org/security/2005/dsa-833
(UNKNOWN)  DEBIAN  DSA-833
http://www.mandriva.com/security/advisories?name=MDKSA-2005:163
(UNKNOWN)  MANDRIVA  MDKSA-2005:163
http://www.novell.com/linux/security/advisories/2005_21_sr.html
(UNKNOWN)  SUSE  SUSE-SR:2005:021
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html
(UNKNOWN)  FEDORA  FLSA-2006:167803
http://www.securityfocus.com/bid/14509
(PATCH)  BID  14509
http://www.vupen.com/english/advisories/2008/1326/references
(UNKNOWN)  VUPEN  ADV-2008-1326
http://xforce.iss.net/xforce/xfdb/21737
(UNKNOWN)  XF  mysql-user-defined-function-bo(21737)
https://www.ubuntu.com/usn/usn-180-1/
(UNKNOWN)  UBUNTU  USN-180-1
https://www.ubuntu.com/usn/usn-180-2/
(UNKNOWN)  UBUNTU  USN-180-2

- 漏洞信息

MySQL 缓冲区溢出漏洞
中危 缓冲区溢出
2005-08-16 00:00:00 2006-03-28 00:00:00
远程  
        MySQL是一款使用非常广泛的开放源代码关系数据库系统,拥有各种平台的运行版本。
        MySQL的init_syms()函数在将用户指定字符串拷贝到栈缓冲区时使用了不安全的字符串函数,导致攻击者可能利用此漏洞在主机上执行任意指令。
        由于没有正确的过滤这个缓冲区,攻击者可能溢出该缓冲区,覆盖部分栈。这允许攻击者在缓冲区末尾之外写入14个字节的任意数据和8字节的硬编码数据。
        CREATE FUNCTION语句格式如下:
        CREATE FUNCTION function_name RETURNS type SONAME "library_name"
        function_name字段的用户指定输入仅限于64个字符。如果操作系统成功的调用了这个库的话,控制就会交给init_syms()。这会试图将用户字符串拷贝到50个字节的缓冲区中,然后将硬编码字符串拷贝到用户字符串末尾。在一些早期版本的MySQL中,攻击者可以利用上述操作完全控制EIP,或将指定的数据拷贝到任意位置。
        

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.debian.org/security/2005/dsa-829
        http://www.debian.org/security/2005/dsa-833
        http://www.debian.org/security/2005/dsa-831

- 漏洞信息 (F40368)

Debian Linux Security Advisory 833-1 (PacketStormID:F40368)
2005-10-04 00:00:00
Debian  security.debian.org
advisory,remote,overflow,arbitrary
linux,debian
CVE-2005-2558
[点击下载]

Debian Security Advisory DSA 833-1 - A stack-based buffer overflow in the init_syms function of MySQL, a popular database, has been discovered that allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field. The ability to create user-defined functions is not typically granted to untrusted users.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 833-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
October 1st, 2005                       http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : mysql-dfsg-4.1
Vulnerability  : buffer overflow
Problem type   : remote
Debian-specific: no
CVE ID         : CAN-2005-2558
BugTraq ID     : 14509

A stack-based buffer overflow in the init_syms function of MySQL, a
popular database, has been discovered that allows remote authenticated
users who can create user-defined functions to execute arbitrary code
via a long function_name field.  The ability to create user-defined
functions is not typically granted to untrusted users.

The following vulnerability matrix explains which version of MySQL in
which distribution has this problem fixed:

                     woody              sarge              sid
mysql             3.23.49-8.14           n/a               n/a
mysql-dfsg            n/a          4.0.24-10sarge1    4.0.24-10sarge1
mysql-dfsg-4.1        n/a          4.1.11a-4sarge2        4.1.14-2
mysql-dfsg-5.0        n/a                n/a            5.0.11beta-3

We recommend that you upgrade your mysql-dfsg-4.1 packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a-4sarge2.dsc
      Size/MD5 checksum:     1021 ef5b7f754fd69c6ddf96185a9ea99d8c
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a-4sarge2.diff.gz
      Size/MD5 checksum:   163217 c22faa82cad1a38568146d03a316b4c3
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a.orig.tar.gz
      Size/MD5 checksum: 15771855 3c0582606a8903e758c2014c2481c7c3

  Architecture independent components:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.11a-4sarge2_all.deb
      Size/MD5 checksum:    35758 f4c17c57aaed4aba0d06b22391a443ff

  Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge2_alpha.deb
      Size/MD5 checksum:  1589626 326e06854e8cc7b4df3ca853a8776e6f
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge2_alpha.deb
      Size/MD5 checksum:  7963496 4da7672c7e6ce497cc6c2b72c2438c5f
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge2_alpha.deb
      Size/MD5 checksum:  1000022 a8edacbc3c87b781c4aae6772c42f2c9
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge2_alpha.deb
      Size/MD5 checksum: 17484824 d0e8f9bfebd9c492d0ed336c236050ad

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge2_amd64.deb
      Size/MD5 checksum:  1450438 8e3eca09ae3044bc15d7332a97eaadb3
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge2_amd64.deb
      Size/MD5 checksum:  5549144 3b9308fd3c89158b20ae75ab4835d333
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge2_amd64.deb
      Size/MD5 checksum:   848676 0cdc8e7e48e1821fcbab39aee1c6b22b
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge2_amd64.deb
      Size/MD5 checksum: 14709814 b602e0bff5fda27efbc2bf52c0b46e32

  ARM architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge2_arm.deb
      Size/MD5 checksum:  1388184 ba83a61338a7b6198754c22e134bdabd
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge2_arm.deb
      Size/MD5 checksum:  5557760 54ac64644fe2897b5c2554f5332bf402
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge2_arm.deb
      Size/MD5 checksum:   835900 a29f9b8bfe41d70e24cb6eef94b43bc9
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge2_arm.deb
      Size/MD5 checksum: 14555832 a482f115a2f27abee4ad2a79dfbd6cd1

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge2_i386.deb
      Size/MD5 checksum:  1416570 e49242dae5f45b947a47ea1fe728d128
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge2_i386.deb
      Size/MD5 checksum:  5641688 b3eb7e254df56c09ada9c1fa61fab946
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge2_i386.deb
      Size/MD5 checksum:   829688 f3cdde3f2a6698f394ba0edfdbd29446
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge2_i386.deb
      Size/MD5 checksum: 14556498 45421b845326a2e40a720dc44b64985d

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge2_ia64.deb
      Size/MD5 checksum:  1711912 475cfa72891c402d1c948be09e6a98f7
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge2_ia64.deb
      Size/MD5 checksum:  7780996 03bd4ba1db9460ef9d9be5b01d880453
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge2_ia64.deb
      Size/MD5 checksum:  1049796 b8253e96506666bc4a3b659994bdd48a
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge2_ia64.deb
      Size/MD5 checksum: 18474740 4a483fc2350bda7a6eb2599c7fbf9e0d

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge2_hppa.deb
      Size/MD5 checksum:  1550304 aadb8f7fbda0ef84b8afcf7baf76dffb
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge2_hppa.deb
      Size/MD5 checksum:  6249354 21f0e228f658552c1ecb4d05975e3921
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge2_hppa.deb
      Size/MD5 checksum:   909194 235968a78d019efc6be2e1df68fb4cb3
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge2_hppa.deb
      Size/MD5 checksum: 15786932 aee2e68c3f7938d0ba7292289f032bda

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge2_m68k.deb
      Size/MD5 checksum:  1396882 3ef005165d935a0089c42b9dca782125
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge2_m68k.deb
      Size/MD5 checksum:  5282906 9becdb0b18c3c42b5211739e9f5f5f46
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge2_m68k.deb
      Size/MD5 checksum:   803022 43eb1fdfe29144e10d1730f1dcc45507
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge2_m68k.deb
      Size/MD5 checksum: 14070110 51c9d88be73414000742c7c2961307a1

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge1_mips.deb
      Size/MD5 checksum:  1477766 fb7a8d1fb9d4607d7172c36032ebcbbb
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge1_mips.deb
      Size/MD5 checksum:  6051760 6e97430bc9b02e866e04414e627f9f4c
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge1_mips.deb
      Size/MD5 checksum:   903542 f99636d7c17d9b9647c34d3dd3379c2d
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge1_mips.deb
      Size/MD5 checksum: 15407442 36eaf9d65e7c4dcaeff920389c6bd890

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge2_mipsel.deb
      Size/MD5 checksum:  1445350 539eadf9ac7e9b384825c944759ec6b4
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge2_mipsel.deb
      Size/MD5 checksum:  5969562 bdf9697878b6a439d079528660a67fbc
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge2_mipsel.deb
      Size/MD5 checksum:   889260 07d1f0071ce62ce433c9c924544fe5fc
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge2_mipsel.deb
      Size/MD5 checksum: 15103284 5be83f139ae6ac41ffad5a2a7a52ce49

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge2_powerpc.deb
      Size/MD5 checksum:  1475432 2fc2f711fd16172952db58a59c17f9cb
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge2_powerpc.deb
      Size/MD5 checksum:  6025146 f230533abfce5f92e7ee95d0966ea984
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge2_powerpc.deb
      Size/MD5 checksum:   906432 d566b964257453976d7c36e309b705de
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge2_powerpc.deb
      Size/MD5 checksum: 15402508 dc78398b45128bc2d2f6881427ff044d

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge2_s390.deb
      Size/MD5 checksum:  1537572 fc84f1f6e3f72bf3e62ae6d09fd29ed5
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge2_s390.deb
      Size/MD5 checksum:  5460800 94db267d9e373a8490a0067257ae14a4
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge2_s390.deb
      Size/MD5 checksum:   883408 9f613cb6264d5fd7da0c216301e34af1
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge2_s390.deb
      Size/MD5 checksum: 15053922 3d90c52ba65c7550da1558bb7d5ab346

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge2_sparc.deb
      Size/MD5 checksum:  1459496 478640727168f01c3832f53ada90b8d9
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge2_sparc.deb
      Size/MD5 checksum:  6205444 427316f73787f388a361c76124e59cb5
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge2_sparc.deb
      Size/MD5 checksum:   867394 9e2217f00d72fa652b5e45fae5829eb8
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge2_sparc.deb
      Size/MD5 checksum: 15390434 e79df4002a1dfb61f2253030e8cb1033


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDPiEoW5ql+IAeqTIRAl2AAJ42+ox3ZvYLrxf7+o89BeG4RDYk/ACgrvXu
0RUppTfZcSGpQzYWiiFxfmE=
=t2xX
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F40366)

Debian Linux Security Advisory 831-1 (PacketStormID:F40366)
2005-10-04 00:00:00
Debian  security.debian.org
advisory,remote,overflow,arbitrary
linux,debian
CVE-2005-2558
[点击下载]

Debian Security Advisory DSA 831-1 - A stack-based buffer overflow in the init_syms function of MySQL, a popular database, has been discovered that allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field. The ability to create user-defined functions is not typically granted to untrusted users.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 831-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
September 30th, 2005                    http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : mysql-dfsg
Vulnerability  : buffer overflow
Problem type   : remote
Debian-specific: no
CVE ID         : CAN-2005-2558
BugTraq ID     : 14509

A stack-based buffer overflow in the init_syms function of MySQL, a
popular database, has been discovered that allows remote authenticated
users who can create user-defined functions to execute arbitrary code
via a long function_name field.  The ability to create user-defined
functions is not typically granted to untrusted users.

The following vulnerability matrix shows which version of MySQL in
which distribution has this problem fixed:

                     woody              sarge              sid
mysql             3.23.49-8.14           n/a               n/a
mysql-dfsg            n/a          4.0.24-10sarge1    4.0.24-10sarge1
mysql-dfsg-4.1        n/a          4.1.11a-4sarge2        4.1.14-2
mysql-dfsg-5.0        n/a                n/a            5.0.11beta-3

We recommend that you upgrade your mysql-dfsg packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-dfsg_4.0.24-10sarge1.dsc
      Size/MD5 checksum:      958 ef6d09f85e30f4cb28247ed89d89d5fd
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-dfsg_4.0.24-10sarge1.diff.gz
      Size/MD5 checksum:    96827 2514e42a9185a93ed171330cd3bf7c14
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-dfsg_4.0.24.orig.tar.gz
      Size/MD5 checksum:  9923794 aed8f335795a359f32492159e3edfaa3

  Architecture independent components:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-common_4.0.24-10sarge1_all.deb
      Size/MD5 checksum:    34244 23f7d491ed4414fe5d90ce32e530d73f

  Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge1_alpha.deb
      Size/MD5 checksum:   355636 8b44cb0bb88c22adaba893b078b42f10
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge1_alpha.deb
      Size/MD5 checksum:  4531206 b7b9e5625d2bfe56eaadb9a70f8bfb7b
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge1_alpha.deb
      Size/MD5 checksum:   520364 1d52718cabe9bb70cae93a5e36454599
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge1_alpha.deb
      Size/MD5 checksum:  4889832 57d389c2a06587003baa0aed6c06327b

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge1_amd64.deb
      Size/MD5 checksum:   308352 140315ed4f6aa4b65aa55e3ad5c7ee1b
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge1_amd64.deb
      Size/MD5 checksum:  3180962 ea51575440e8843da102eba8abd140d6
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge1_amd64.deb
      Size/MD5 checksum:   433754 9bd7ec85ea59f619b689616f0588ce16
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge1_amd64.deb
      Size/MD5 checksum:  3878564 1393307fc702474aa7b5a4c85b97a3b3

  ARM architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge1_arm.deb
      Size/MD5 checksum:   287558 14b2b6a42d1ffbf9b9d8196b4cb92ec7
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge1_arm.deb
      Size/MD5 checksum:  2847506 92528933395360e67b9c16459c8e7463
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge1_arm.deb
      Size/MD5 checksum:   413850 7b1c3fee0d8528785048b10a79971a81
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge1_arm.deb
      Size/MD5 checksum:  3481910 f3df2639e7958e7e44253b44d09d55bc

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge1_i386.deb
      Size/MD5 checksum:   295858 78a28a891f77a9f57be894f952fa973e
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge1_i386.deb
      Size/MD5 checksum:  2921040 c9251ef3f0417002b0bfbe0e41c1f917
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge1_i386.deb
      Size/MD5 checksum:   414914 18a71162305cec909feff698e94b246e
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge1_i386.deb
      Size/MD5 checksum:  3645680 b1877cc602daf4b3aeffd350ced6f6a7

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge1_ia64.deb
      Size/MD5 checksum:   394278 96a69d86b656854517f9d26a174455a0
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge1_ia64.deb
      Size/MD5 checksum:  4470346 31db6bbb9312fee00bbdab0a4f221462
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge1_ia64.deb
      Size/MD5 checksum:   562640 9fa06e7846f0eff259883026efeed8ec
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge1_ia64.deb
      Size/MD5 checksum:  5327746 32f25ae659e144171db32db5805a012f

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge1_hppa.deb
      Size/MD5 checksum:   329136 483c7ce0e6cc9be38114b7374bdb3a86
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge1_hppa.deb
      Size/MD5 checksum:  3312988 38ba97f60138deba6709de1855178962
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge1_hppa.deb
      Size/MD5 checksum:   455874 406ae448090f48e84c3759a09ef9dbe6
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge1_hppa.deb
      Size/MD5 checksum:  3946630 fe55c1fcea57d60fd613382739dfdb53

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge1_m68k.deb
      Size/MD5 checksum:   278808 5d02c5949dc53cd1ba299379209cc843
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge1_m68k.deb
      Size/MD5 checksum:  2664322 23697281b84956a8eb85d1c9d4c699c9
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge1_m68k.deb
      Size/MD5 checksum:   390032 8f0b0ee2e57a2414ba4d13544307410c
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge1_m68k.deb
      Size/MD5 checksum:  3292478 9de4afa8cf0a9ddacb037fed370204d9

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge1_mips.deb
      Size/MD5 checksum:   313274 d615c5c6b9dbe639f4ba6147d8c42bd7
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge1_mips.deb
      Size/MD5 checksum:  3180736 13f518e4ae2ef2d41c400beb98eef49d
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge1_mips.deb
      Size/MD5 checksum:   456936 b6009b864c9bebdd174b7c26a5dbfec4
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge1_mips.deb
      Size/MD5 checksum:  3812700 c22aa2b9769932e1684048f367a5cdf8

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge1_mipsel.deb
      Size/MD5 checksum:   313104 4a09bd0f0eaf6e029f4feefbfc56cef7
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge1_mipsel.deb
      Size/MD5 checksum:  3168654 d78a8b34ddbd1210e3ede8b6dae1a331
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge1_mipsel.deb
      Size/MD5 checksum:   456968 d5ca3e5273c080cba900be64b85b649b
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge1_mipsel.deb
      Size/MD5 checksum:  3799672 01f7dbca9f571cd8713db0822f1223ba

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge1_powerpc.deb
      Size/MD5 checksum:   314312 41f521c820a1a1244b3dc3df62bf6df1
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge1_powerpc.deb
      Size/MD5 checksum:  3182366 751bac1999dd7c670b9b246e1b708c6d
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge1_powerpc.deb
      Size/MD5 checksum:   464346 f04232af81e2a38d97a41771e0c46291
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge1_powerpc.deb
      Size/MD5 checksum:  3841732 49f8f76954ee2b07597b2db0d807c0b3

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge1_s390.deb
      Size/MD5 checksum:   323908 dd1bd936d0b694a760f5a8087fd213b9
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge1_s390.deb
      Size/MD5 checksum:  2829248 4ec90961d9ff068a35b82fe623b946a6
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge1_s390.deb
      Size/MD5 checksum:   442108 5956843b3beb3705ae2e975c51ad660f
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge1_s390.deb
      Size/MD5 checksum:  3665078 d688a2d6f5432286c6dadf0b7d040397

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12_4.0.24-10sarge1_sparc.deb
      Size/MD5 checksum:   303966 86b2d1eba7f57f62f14f7444f0fce6dd
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/libmysqlclient12-dev_4.0.24-10sarge1_sparc.deb
      Size/MD5 checksum:  3268272 05d775d35dbb32c64f95805cc44300f5
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-client_4.0.24-10sarge1_sparc.deb
      Size/MD5 checksum:   429692 4e2dfd716672942be7b54b75c624c460
    http://security.debian.org/pool/updates/main/m/mysql-dfsg/mysql-server_4.0.24-10sarge1_sparc.deb
      Size/MD5 checksum:  3821202 4d3579a8fdb79d2193172e2710e65a65


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDPR6kW5ql+IAeqTIRAnXLAJ9NEHKpIvOmHbhbaWZLJhLpjjGSEwCbB0I3
GOe1W7XNNvlLUqp0v12tbd0=
=0xE3
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F40364)

Debian Linux Security Advisory 829-1 (PacketStormID:F40364)
2005-10-04 00:00:00
Debian  security.debian.org
advisory,remote,overflow,arbitrary
linux,debian
CVE-2005-2558
[点击下载]

Debian Security Advisory DSA 829-1 - A stack-based buffer overflow in the init_syms function of MySQL, a popular database, has been discovered that allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field. The ability to create user-defined functions is not typically granted to untrusted users.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 829-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
September 30, 2005                      http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : mysql
Vulnerability  : buffer overflow
Problem type   : remote
Debian-specific: no
CVE ID         : CAN-2005-2558
BugTraq ID     : 14509

A stack-based buffer overflow in the init_syms function of MySQL, a
popular database, has been discovered that allows remote authenticated
users who can create user-defined functions to execute arbitrary code
via a long function_name field.  The ability to create user-defined
functions is not typically granted to untrusted users.

The following vulnerability matrix shows which version of MySQL in
which distribution has this problem fixed:

                     woody              sarge              sid
mysql             3.23.49-8.14           n/a               n/a
mysql-dfsg            n/a          4.0.24-10sarge1    4.0.24-10sarge1
mysql-dfsg-4.1        n/a          4.1.11a-4sarge2        4.1.14-2
mysql-dfsg-5.0        n/a                n/a            5.0.11beta-3

We recommend that you upgrade your mysql packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/mysql/mysql_3.23.49-8.14.dsc
      Size/MD5 checksum:      877 6c46a2c935eb285140da38fe19a93382
    http://security.debian.org/pool/updates/main/m/mysql/mysql_3.23.49-8.14.diff.gz
      Size/MD5 checksum:    85549 ebd8c30055708a455cb4ccd064a931f5
    http://security.debian.org/pool/updates/main/m/mysql/mysql_3.23.49.orig.tar.gz
      Size/MD5 checksum: 11861035 a2820d81997779a9fdf1f4b3c321564a

  Architecture independent components:

    http://security.debian.org/pool/updates/main/m/mysql/mysql-common_3.23.49-8.14_all.deb
      Size/MD5 checksum:    18490 0663194884fd4c4d066bac4a6df5f0e3
    http://security.debian.org/pool/updates/main/m/mysql/mysql-doc_3.23.49-8.5_all.deb
      Size/MD5 checksum:  1962992 a4cacebaadf9d5988da0ed1a336b48e6

  Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.14_alpha.deb
      Size/MD5 checksum:   279812 5fc369c5e55b75b54f1f96600efc7611
    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.14_alpha.deb
      Size/MD5 checksum:   781182 06317a1507de6299aa2f7af79e1c47b7
    http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.14_alpha.deb
      Size/MD5 checksum:   165206 f8f3a7c3f5b93be123648f61ef7d3e42
    http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.14_alpha.deb
      Size/MD5 checksum:  3637322 7e0dcbe056038813b79059209109c817

  ARM architecture:

    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.14_arm.deb
      Size/MD5 checksum:   240302 f38ae36e250a08516e84d74b5933da3c
    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.14_arm.deb
      Size/MD5 checksum:   636894 ee11f194944a0944ee69f282ef93a6db
    http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.14_arm.deb
      Size/MD5 checksum:   125556 63e9a21903d558aa31872c96b5b0a9f2
    http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.14_arm.deb
      Size/MD5 checksum:  2809136 6b7eb832b271f2e9e1bc0da437e77517

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.14_i386.deb
      Size/MD5 checksum:   236462 a88ca1a9117992e7612f67ac3c5e233b
    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.14_i386.deb
      Size/MD5 checksum:   578470 8498436d79a3c4e0a21430c1a936f3f3
    http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.14_i386.deb
      Size/MD5 checksum:   124152 f00a5007b19df61d50f462bbf2b16eab
    http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.14_i386.deb
      Size/MD5 checksum:  2802684 0c7ae03086a6fb616f25d11a12f59dd3

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.14_ia64.deb
      Size/MD5 checksum:   317096 8fd6cc4430b0be71e8e3e29653d1c385
    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.14_ia64.deb
      Size/MD5 checksum:   850834 25ee3b8c128001bc812b07106bca1919
    http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.14_ia64.deb
      Size/MD5 checksum:   175374 33057b4bd48a10afeed341bc5326df2d
    http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.14_ia64.deb
      Size/MD5 checksum:  4001596 c2553b10eaa03c0086cd045c6645fa21

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.14_hppa.deb
      Size/MD5 checksum:   282714 a4beafeb9dbef09d855fbbae69593a9a
    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.14_hppa.deb
      Size/MD5 checksum:   746106 da172b65b2476554fda7f76d23b2ddf8
    http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.14_hppa.deb
      Size/MD5 checksum:   142182 310f0ef1682301e22c49004db4dccaa6
    http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.14_hppa.deb
      Size/MD5 checksum:  3516838 bdd5466d02128d767ec9e95259d0c478

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.14_m68k.deb
      Size/MD5 checksum:   229626 11819aa106d97c216a58992d38741384
    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.14_m68k.deb
      Size/MD5 checksum:   559644 dda615853fac6ff347c2c28f34a8ad89
    http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.14_m68k.deb
      Size/MD5 checksum:   119980 83773f99d401e676f524d31afc98cf0f
    http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.14_m68k.deb
      Size/MD5 checksum:  2649554 812c67dd1714acc49437c3d103a58fcf

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.14_mips.deb
      Size/MD5 checksum:   252912 f4a651db3d6d21e85e8a2ba1b90c71bd
    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.14_mips.deb
      Size/MD5 checksum:   691086 1d8b5a6120ab33e263b798fbde56cd0d
    http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.14_mips.deb
      Size/MD5 checksum:   135446 14cf2bf322b0c4d97169a48b3c465088
    http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.14_mips.deb
      Size/MD5 checksum:  2851490 34c1dcf229f22b27f10881e7d178eff8

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.14_mipsel.deb
      Size/MD5 checksum:   252578 b30b1e6efcb6d814fc2f54ce01cbcbc2
    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.14_mipsel.deb
      Size/MD5 checksum:   690538 0f3486135c2a9e7e2b6d539b747337a1
    http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.14_mipsel.deb
      Size/MD5 checksum:   135810 0a1f0808bcd847205c617f933da7ae4d
    http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.14_mipsel.deb
      Size/MD5 checksum:  2841096 7b75481f884758f16477c86a51bb37ae

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.14_powerpc.deb
      Size/MD5 checksum:   249676 df2ce297450c8f6e6d9d485a5ac70b66
    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.14_powerpc.deb
      Size/MD5 checksum:   654774 57850699654d9c713333db713e321ec1
    http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.14_powerpc.deb
      Size/MD5 checksum:   131016 3002fb27dc21450f4f705979d34e6664
    http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.14_powerpc.deb
      Size/MD5 checksum:  2826176 1becf085f621b056169693d408ad3f8c

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.14_s390.deb
      Size/MD5 checksum:   251944 213455557dab1e21a6b8661b7fae0969
    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.14_s390.deb
      Size/MD5 checksum:   609592 aac39e06ea9ecb31ce0dc03805e6b47c
    http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.14_s390.deb
      Size/MD5 checksum:   127992 69903a71808830e2b1fbc9b304810414
    http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.14_s390.deb
      Size/MD5 checksum:  2693968 2b41561b8d7c13db5c312a55e770f8e9

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.14_sparc.deb
      Size/MD5 checksum:   242884 6f2d616af8bc5830005f2991e93ef74f
    http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.14_sparc.deb
      Size/MD5 checksum:   617996 314067541e885567bc9ba26207da7b09
    http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.14_sparc.deb
      Size/MD5 checksum:   131984 2f8bdb7ec1d0069bca126cbccd64e858
    http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.14_sparc.deb
      Size/MD5 checksum:  2943010 ce1e2eb8aac0dd21d1ffd5c05f8355f8


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDPN/sW5ql+IAeqTIRAnSJAJwODrDQ0LjJe2XMgVlI36p7RcjtygCdHvPd
2isxh+FfW7f3GULal++eD4A=
=Mpbh
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F40033)

Mandriva Linux Security Advisory 2005.163 (PacketStormID:F40033)
2005-09-14 00:00:00
Mandriva  mandriva.com
advisory,overflow,arbitrary
linux,mandriva
CVE-2005-2558
[点击下载]

Mandriva Linux Security Update Advisory - A stack-based buffer overflow was discovered in the init_syms function in MySQL that allows authenticated users that can create user-defined functions to execute arbitrary code via a long function_name field.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                Mandriva Linux Security Update Advisory
 _______________________________________________________________________

 Package name:           MySQL
 Advisory ID:            MDKSA-2005:163
 Date:                   September 12th, 2005

 Affected versions:	 10.1, 10.2, Corporate 3.0
 ______________________________________________________________________

 Problem Description:

 A stack-based buffer overflow was discovered in the init_syms function
 in MySQL that allows authenticated users that can create user-defined
 functions to execute arbitrary code via a long function_name field.
 
 The updated packages have been patched to address these issues.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2558
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.1:
 c0ca77359461d6e4503d040f657405cc  10.1/RPMS/libmysql12-4.0.20-3.5.101mdk.i586.rpm
 3ee6767c39b4e24e7ff178479fff4da4  10.1/RPMS/libmysql12-devel-4.0.20-3.5.101mdk.i586.rpm
 5fff82de496c98638c91b3b20fcc0be1  10.1/RPMS/MySQL-4.0.20-3.5.101mdk.i586.rpm
 c47820ad3f2568279a8854a59a5ca6c4  10.1/RPMS/MySQL-Max-4.0.20-3.5.101mdk.i586.rpm
 2ca25895290ff3e717ea4fb21b25beec  10.1/RPMS/MySQL-bench-4.0.20-3.5.101mdk.i586.rpm
 5dde3104a02b283dd4ea53255be6e28c  10.1/RPMS/MySQL-client-4.0.20-3.5.101mdk.i586.rpm
 d7d411a693de4e757f6bd87c3d3e8228  10.1/RPMS/MySQL-common-4.0.20-3.5.101mdk.i586.rpm
 147a03a204620f68094e327236d8569a  10.1/SRPMS/MySQL-4.0.20-3.5.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 6efbf74429938fe12d67e724975669f7  x86_64/10.1/RPMS/lib64mysql12-4.0.20-3.5.101mdk.x86_64.rpm
 e8ea787e503f420646d0ab1aeb7fd7bd  x86_64/10.1/RPMS/lib64mysql12-devel-4.0.20-3.5.101mdk.x86_64.rpm
 e1c87e33304d7c5dece5a0bfed367f41  x86_64/10.1/RPMS/MySQL-4.0.20-3.5.101mdk.x86_64.rpm
 c02df0a16db0f3440afedd53c9bd5510  x86_64/10.1/RPMS/MySQL-Max-4.0.20-3.5.101mdk.x86_64.rpm
 886d53b2b08d334209fda4e14920b075  x86_64/10.1/RPMS/MySQL-bench-4.0.20-3.5.101mdk.x86_64.rpm
 cb934efc4a61c0ec2dca9c6f6e8d56a5  x86_64/10.1/RPMS/MySQL-client-4.0.20-3.5.101mdk.x86_64.rpm
 fc6b5c2cad48ee84c2dda8094b504874  x86_64/10.1/RPMS/MySQL-common-4.0.20-3.5.101mdk.x86_64.rpm
 147a03a204620f68094e327236d8569a  x86_64/10.1/SRPMS/MySQL-4.0.20-3.5.101mdk.src.rpm

 Mandrakelinux 10.2:
 672a98dc051b64e6a5efee02cdc163d8  10.2/RPMS/libmysql14-4.1.11-1.1.102mdk.i586.rpm
 07a736279b7623325c2f2fde828886e3  10.2/RPMS/libmysql14-devel-4.1.11-1.1.102mdk.i586.rpm
 cb2fb817c72a88d905a0875694ec8b7f  10.2/RPMS/MySQL-4.1.11-1.1.102mdk.i586.rpm
 8a2e42d756032bc400bc1d10170e6f46  10.2/RPMS/MySQL-Max-4.1.11-1.1.102mdk.i586.rpm
 d008f499f18cef6c9d92cade794a765c  10.2/RPMS/MySQL-NDB-4.1.11-1.1.102mdk.i586.rpm
 2d3a54a41b82cff0c9d22a442a5df6af  10.2/RPMS/MySQL-bench-4.1.11-1.1.102mdk.i586.rpm
 47185384cc46fbb7651dd220a63cfd9c  10.2/RPMS/MySQL-client-4.1.11-1.1.102mdk.i586.rpm
 3a434ce8c27ebb6979c350c551815939  10.2/RPMS/MySQL-common-4.1.11-1.1.102mdk.i586.rpm
 ec76c46c73c9c4a2b454026c98e9e37a  10.2/SRPMS/MySQL-4.1.11-1.1.102mdk.src.rpm

 Mandrakelinux 10.2/X86_64:
 45058361222d0099c5b76e0fff9106e1  x86_64/10.2/RPMS/lib64mysql14-4.1.11-1.1.102mdk.x86_64.rpm
 2dd5dbdf223f5200c032e8f3f6feb525  x86_64/10.2/RPMS/lib64mysql14-devel-4.1.11-1.1.102mdk.x86_64.rpm
 4c2c5755a8f887aec086edef890de8ab  x86_64/10.2/RPMS/MySQL-4.1.11-1.1.102mdk.x86_64.rpm
 892005b80148274b24279a159c14ea84  x86_64/10.2/RPMS/MySQL-Max-4.1.11-1.1.102mdk.x86_64.rpm
 9c99ebde5888ac68543aad8db0bfbbf1  x86_64/10.2/RPMS/MySQL-NDB-4.1.11-1.1.102mdk.x86_64.rpm
 a69e37c9949a9def639560ad6c51b387  x86_64/10.2/RPMS/MySQL-bench-4.1.11-1.1.102mdk.x86_64.rpm
 9b036b241347c113e971d2006baf0d3c  x86_64/10.2/RPMS/MySQL-client-4.1.11-1.1.102mdk.x86_64.rpm
 81faea0e3ed95a1e62d912f24e98aa65  x86_64/10.2/RPMS/MySQL-common-4.1.11-1.1.102mdk.x86_64.rpm
 ec76c46c73c9c4a2b454026c98e9e37a  x86_64/10.2/SRPMS/MySQL-4.1.11-1.1.102mdk.src.rpm

 Corporate 3.0:
 04d4151eae7ed878c21f2e279c859a2a  corporate/3.0/RPMS/libmysql12-4.0.18-1.6.C30mdk.i586.rpm
 f6c6fe9dc10a247ac1ea20b3bf7cbaaa  corporate/3.0/RPMS/libmysql12-devel-4.0.18-1.6.C30mdk.i586.rpm
 516d015085f8877d4a10492053c74133  corporate/3.0/RPMS/MySQL-4.0.18-1.6.C30mdk.i586.rpm
 52176303aa9e6915f34446a2575bcfa1  corporate/3.0/RPMS/MySQL-Max-4.0.18-1.6.C30mdk.i586.rpm
 4c19bb8b4a2c3a731d056ce39b84fd26  corporate/3.0/RPMS/MySQL-bench-4.0.18-1.6.C30mdk.i586.rpm
 5a84ae1d8c37fe41271f9797a90921b6  corporate/3.0/RPMS/MySQL-client-4.0.18-1.6.C30mdk.i586.rpm
 fe50c3c3380f386064c9c580e8468677  corporate/3.0/RPMS/MySQL-common-4.0.18-1.6.C30mdk.i586.rpm
 76fc1db6495adc321fc2d0952a27bb91  corporate/3.0/SRPMS/MySQL-4.0.18-1.6.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 02c3a2e98692e6c71e5497a536b30d4e  x86_64/corporate/3.0/RPMS/lib64mysql12-4.0.18-1.6.C30mdk.x86_64.rpm
 475624ad614c0f109ce0fbf952335987  x86_64/corporate/3.0/RPMS/lib64mysql12-devel-4.0.18-1.6.C30mdk.x86_64.rpm
 df26496e1bd68d73d62a7c786b54b6ed  x86_64/corporate/3.0/RPMS/MySQL-4.0.18-1.6.C30mdk.x86_64.rpm
 3b75ce48513acd6dc9aa228058642f0f  x86_64/corporate/3.0/RPMS/MySQL-Max-4.0.18-1.6.C30mdk.x86_64.rpm
 21347726c3d48e6d13723516a15d87fb  x86_64/corporate/3.0/RPMS/MySQL-bench-4.0.18-1.6.C30mdk.x86_64.rpm
 fef51176d24e8874ddca4af5653bacc9  x86_64/corporate/3.0/RPMS/MySQL-client-4.0.18-1.6.C30mdk.x86_64.rpm
 7e59b805ab766f84d118f4fc5b2755ec  x86_64/corporate/3.0/RPMS/MySQL-common-4.0.18-1.6.C30mdk.x86_64.rpm
 76fc1db6495adc321fc2d0952a27bb91  x86_64/corporate/3.0/SRPMS/MySQL-4.0.18-1.6.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDJmxzmqjQ0CJFipgRAlXrAJ4+GenFKgWyhmkpbchb7s5F9CPf4ACgvTa2
uv487XrACLdZ+yoASOC+RrE=
=BE/G
-----END PGP SIGNATURE-----
    

- 漏洞信息

18896
MySQL User-Defined Function init_syms() Function Overflow
Input Manipulation
Loss of Integrity Patch / RCS, Upgrade
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-08-08 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

MySQL User-Defined Function Buffer Overflow Vulnerability
Boundary Condition Error 14509
Yes No
2005-08-08 12:00:00 2008-07-02 08:50:00
Discovery is credited to Reid Borsuk of Application Security Inc.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Turbolinux Turbolinux Workstation 8.0
Turbolinux Turbolinux Server 10.0 x86
Turbolinux Turbolinux Server 10.0
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Server 7.0
Turbolinux Turbolinux Desktop 10.0
Turbolinux Turbolinux FUJI
Turbolinux Turbolinux 10 F...
TurboLinux Personal
TurboLinux Multimedia
Turbolinux Home
Turbolinux Appliance Server Workgroup Edition 1.0
Turbolinux Appliance Server Hosting Edition 1.0
Turbolinux Appliance Server 1.0 Workgroup Edition
Turbolinux Appliance Server 1.0 Hosting Edition
Turbolinux Appliance Server 2.0
Trend Micro InterScan VirusWall 8.0
TransSoft Broker FTP Server 8.0
TransSoft Broker FTP Server 7.0
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
SuSE SUSE Linux Enterprise Server 7
+ Linux kernel 2.4.19
Sun Solaris 10_x86
Sun Solaris 10_sparc
Sun Solaris 10.0_x86
Sun Solaris 10.0
Sun Solaris 10
SCO Unixware 7.1.4
S.u.S.E. SuSE Linux Standard Server 8.0
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SUSE LINUX Retail Solution 8.0
S.u.S.E. SuSE Linux Openexchange Server 4.0
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 9.0 x86_64
S.u.S.E. Linux Professional 9.0
S.u.S.E. Linux Professional 8.2
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. cvsup-16.1h-36.i586.rpm
+ S.u.S.E. Linux Personal 9.0
RedHat Linux 9.0 i386
RedHat Linux 7.3 i686
RedHat Linux 7.3 i386
RedHat Linux 7.3
Red Hat Fedora Core4
Red Hat Fedora Core3
MySQL AB MySQL 5.0.4
MySQL AB MySQL 5.0.3
MySQL AB MySQL 5.0.2
MySQL AB MySQL 5.0.1
MySQL AB MySQL 5.0 .0-alpha
MySQL AB MySQL 5.0 .0-0
MySQL AB MySQL 4.1.5
MySQL AB MySQL 4.1.4
MySQL AB MySQL 4.1.3 -beta
MySQL AB MySQL 4.1.3 -beta
MySQL AB MySQL 4.1.3 -0
MySQL AB MySQL 4.1.2 -alpha
MySQL AB MySQL 4.0.24
MySQL AB MySQL 4.0.23
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
MySQL AB MySQL 4.0.21
MySQL AB MySQL 4.0.20
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
MySQL AB MySQL 4.0.18
+ MandrakeSoft Corporate Server 3.0 x86_64
+ MandrakeSoft Corporate Server 3.0
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
MySQL AB MySQL 4.0.15
MySQL AB MySQL 4.0.14
MySQL AB MySQL 4.0.13
MySQL AB MySQL 4.0.12
MySQL AB MySQL 4.0.11 -gamma
MySQL AB MySQL 4.0.11
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
MySQL AB MySQL 4.0.10
MySQL AB MySQL 4.0.9 -gamma
MySQL AB MySQL 4.0.9
MySQL AB MySQL 4.0.8 -gamma
MySQL AB MySQL 4.0.8
MySQL AB MySQL 4.0.7 -gamma
MySQL AB MySQL 4.0.7
MySQL AB MySQL 4.0.6
MySQL AB MySQL 4.0.5 a
MySQL AB MySQL 4.0.5
MySQL AB MySQL 4.0.4
MySQL AB MySQL 4.0.3
MySQL AB MySQL 4.0.2
MySQL AB MySQL 4.0.1
MySQL AB MySQL 4.0 .0
MySQL AB MySQL 3.23.49
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ RedHat Linux 7.3 i686
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
MySQL AB MySQL 3.22.25
MySQL AB MySQL 4.1.11a
MySQL AB MySQL 4.1.10a
MySQL AB MySQL 4.1.0.0-alpha
MySQL AB MySQL 4.1.0-0
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Conectiva Linux 10.0
Avaya Interactive Response 3.0
Avaya Interactive Response 2.0

- 漏洞讨论

MySQL is prone to a buffer-overflow vulnerability. The application fails to perform sufficient boundary checks on data supplied as an argument in a user-defined function.

A database user with sufficient access to create a user-defined function can exploit this issue. Attackers may also be able to exploit this issue through latent SQL-injection vulnerabilities in third-party applications that use the database as a backend.

Successful exploits will allow arbitrary code to run in the context of the database server process.

- 漏洞利用

Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

This issue is reportedly addressed in MySQL 4.0.25, 4.1.13, and 5.0.7-beta. Symantec has not confirmed these fixes.

Please see the referenced advisories for details on obtaining and applying the appropriate updates.


MySQL AB MySQL 4.1.11a

MySQL AB MySQL 4.1.0-0

MySQL AB MySQL 3.23.49

MySQL AB MySQL 4.0.18

MySQL AB MySQL 4.0.2

MySQL AB MySQL 4.0.20

MySQL AB MySQL 4.0.23

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站