Debian Security Advisory

DSA-1079-1 mysql-dfsg -- several vulnerabilities

Date Reported:
29 May 2006
Affected Packages:
Security database references:
In the Debian bugtracking system: Bug 366044, Bug 366049, Bug 366163.
In the Bugtraq database (at SecurityFocus): BugTraq ID 16850, BugTraq ID 17780.
In Mitre's CVE dictionary: CVE-2006-0903, CVE-2006-1516, CVE-2006-1517, CVE-2006-1518.
CERT's vulnerabilities, advisories and incident notes: VU#602457.
More information:

Several vulnerabilities have been discovered in MySQL, a popular SQL database. The Common Vulnerabilities and Exposures Project identifies the following problems:

  • CVE-2006-0903

    Improper handling of SQL queries containing the NULL character allows local users to bypass logging mechanisms.

  • CVE-2006-1516

    Usernames without a trailing null byte allow remote attackers to read portions of memory.

  • CVE-2006-1517

    A request with an incorrect packet length allows remote attackers to obtain sensitive information.

  • CVE-2006-1518

    Specially crafted request packets with invalid length values allow the execution of arbitrary code.

The following vulnerability matrix shows which version of MySQL in which distribution has this problem fixed:

  woody sarge sid
mysql 3.23.49-8.15 n/a n/a
mysql-dfsg n/a 4.0.24-10sarge2 n/a
mysql-dfsg-4.1 n/a 4.1.11a-4sarge3 n/a
mysql-dfsg-5.0 n/a n/a 5.0.21-3

We recommend that you upgrade your mysql packages.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Architecture-independent component:
Intel IA-32:
Intel IA-64:
Motorola 680x0:
Big endian MIPS:
Little endian MIPS:
IBM S/390:
Sun Sparc:

MD5 checksums of the listed files are available in the original advisory.