{"vuid":"VU#123384","idnumber":"123384","name":"MySQL client contains buffer overflow","keywords":["MySQL","client","libmysqlclient.so","PHP","libmysqlclient"],"overview":"MySQL is a popular open source database package. The MySQL client that ships with the MySQL package contains a buffer overflow.","clean_desc":"The mysql program, part of the MySQL package, contains a buffer overflow in the host parameter. An intruder who invokes mysql using a specially crafted hostname can execute arbitrary code. Because mysql is not setuid or setgid, a local attacker is unable to use this vulnerability to gain additional privileges under most circumstances. However, when PHP is compiled with MySQL support, it is linked to the library containing the buffer overflow, libmysqlclient.so. If a PHP script or other program establishes a connection to a MySQL database and accepts the hostname argument from untrusted sources, an intruder may be able to execute arbitrary code with the privileges of the web server. See also VU#367320.","impact":"The impact of this vulnerability depends on the context in which MySQL is used, and may vary on a site-by-site basis.","resolution":"Upgrade to MySQL version 3.23.33 or later.","workarounds":"","sysaffected":"","thanks":"Our thanks to \nJoao Gouveia who discovered this vulnerability and posted it to the \nsecurityfocus.com\n BugTraq mailing list on February 9, 2001.","author":"This document was written by Shawn V. Hernan.","public":["http://www.securityfocus.com/archive/1/161917","http://www.mysql.com/doc/N/e/News-3.23.33.html","http://www.kb.cert.org/vuls/id/367320"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-02-14T23:57:55Z","publicdate":"2001-02-09T00:00:00Z","datefirstpublished":"2001-02-18T04:05:26Z","dateupdated":"2001-02-18T04:05:54Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"8","cam_impact":"17","cam_easeofexploitation":"15","cam_attackeraccessrequired":"13","cam_scorecurrent":"11.43675","cam_scorecurrentwidelyknown":"13.923","cam_scorecurrentwidelyknownexploited":"23.868","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.43675,"vulnote":null}