CVE-2006-1518

Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 Patch
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html Patch
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
http://secunia.com/advisories/19929 Patch Vendor Advisory
http://secunia.com/advisories/20241
http://secunia.com/advisories/20253
http://secunia.com/advisories/20333
http://secunia.com/advisories/20457
http://secunia.com/advisories/20762
http://securityreason.com/securityalert/839
http://securitytracker.com/id?1016016 Patch
http://www.debian.org/security/2006/dsa-1071
http://www.debian.org/security/2006/dsa-1073
http://www.debian.org/security/2006/dsa-1079
http://www.kb.cert.org/vuls/id/602457 Patch Third Party Advisory US Government Resource
http://www.novell.com/linux/security/advisories/2006-06-02.html
http://www.securityfocus.com/archive/1/432734/100/0/threaded
http://www.securityfocus.com/bid/17780
http://www.vupen.com/english/advisories/2006/1633
http://www.wisec.it/vulns.php?page=8 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26232
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 Patch
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html Patch
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
http://secunia.com/advisories/19929 Patch Vendor Advisory
http://secunia.com/advisories/20241
http://secunia.com/advisories/20253
http://secunia.com/advisories/20333
http://secunia.com/advisories/20457
http://secunia.com/advisories/20762
http://securityreason.com/securityalert/839
http://securitytracker.com/id?1016016 Patch
http://www.debian.org/security/2006/dsa-1071
http://www.debian.org/security/2006/dsa-1073
http://www.debian.org/security/2006/dsa-1079
http://www.kb.cert.org/vuls/id/602457 Patch Third Party Advisory US Government Resource
http://www.novell.com/linux/security/advisories/2006-06-02.html
http://www.securityfocus.com/archive/1/432734/100/0/threaded
http://www.securityfocus.com/bid/17780
http://www.vupen.com/english/advisories/2006/1633
http://www.wisec.it/vulns.php?page=8 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26232
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*

History

No history.

Information

Published : 2006-05-05 12:46

Updated : 2025-04-03 01:03


NVD link : CVE-2006-1518

Mitre link : CVE-2006-1518

CVE.ORG link : CVE-2006-1518


JSON object : View

Products Affected

oracle

  • mysql

mysql

  • mysql