>From Beyond-Security's SecuriTeam.com(The information has been provided by Tharbad):

A security vulnerability in MySQL, a database management system, has been discovered. 
This vulnerability allows remote attackers to crash by issuing a SELECT statement 
containing a large amount of characters. This crash is due to a buffer overflow, and 
may enable the attacker to execute arbitrary code. The attacker would need access to 
MySQL's query engine to exploit this, e.g. a valid username/password, or an interface 
from which he can enter SQL select statements.

Vulnerable systems:
MySQL version prior to 3.23.31

Immune systems:
MySQL version 3.23.31 and above

Example:
(You need a valid login/password to exploit this.)

# mysql -p -e 'select a.'`perl -e'printf("A"x130)'`'.b'
Enter password:
(hanged..^C)

Alternatively, the following method will work without requiring a password:
# mysql -u --execute=

Reply via email to