CVE-2004-0836
https://notcve.org/view.php?id=CVE-2004-0836
Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length). Desbordamiento de búfer en la función mysql_real_connect de MySQL 4.x anteriores a 3.0.21 y 3.x anteriores a 3.23.49 permite a servidores DNS remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante una respuesta DNS con un un tamaño de dirección largo (h_length). • http://bugs.mysql.com/bug.php?id=4017 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892 http://lists.mysql.com/internals/14726 http://marc.info/?l=bugtraq&m=110140517515735&w=2 http://secunia.com/advisories/12305 http://www.ciac.org/ciac/bulletins/p-018.shtml http://www.debian.org/security/2004/dsa-562 http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml http://www.redhat.com/support/errata/RHSA-2004-597.html http://www.redhat.com& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2004-0457
https://notcve.org/view.php?id=CVE-2004-0457
The mysqlhotcopy script in mysql 4.0.20 and earlier, when using the scp method from the mysql-server package, allows local users to overwrite arbitrary files via a symlink attack on temporary files. El script mysqlhotcopy de mysql 4.0.20 y anteriores, cuando se usa el método scp del paquete mysql-server, permite a usuarios locales sobreescribir ficheros de su elección mediante un ataque de enlaces simbólicos en ficheros temporales. • http://packages.debian.org/changelogs/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.20-11/changelog http://www.ciac.org/ciac/bulletins/p-018.shtml http://www.debian.org/security/2004/dsa-540 http://www.redhat.com/support/errata/RHSA-2004-597.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17030 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10693 https://access.redhat.com/security/cve/CVE-2004-0457 https://bugzilla.redhat.com/show_bug •
CVE-2004-0627 – MySQL 4.1/5.0 - Zero-Length Password Authentication Bypass
https://notcve.org/view.php?id=CVE-2004-0627
The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string. La función check_scramble_323 de MySQL 4.1x anteriores a 4.1.4, y 5.0, permite a atacantes remotos saltarse la autenticación mediente una cadena revuelta de longitud cero. • https://www.exploit-db.com/exploits/311 http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html http://marc.info/?l=bugtraq&m=108904917528205&w=2 http://www.kb.cert.org/vuls/id/184030 •
CVE-2004-0628
https://notcve.org/view.php?id=CVE-2004-0628
Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string. Desbordamiento basado en la pila en MySQL 4.1.x anteriores a 4.1.3, y 5.0 permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código de su elección mediante una cadena de permutación (scramble). • http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html http://marc.info/?l=bugtraq&m=108904917528205&w=2 http://www.kb.cert.org/vuls/id/645326 https://exchange.xforce.ibmcloud.com/vulnerabilities/16612 •
CVE-2004-0388
https://notcve.org/view.php?id=CVE-2004-0388
The mysqld_multi script in MySQL allows local users to overwrite arbitrary files via a symlink attack. • http://dev.mysql.com/doc/mysql/en/news-4-1-2.html http://marc.info/?l=bugtraq&m=108206802810402&w=2 http://secunia.com/advisories/11223 http://security.gentoo.org/glsa/glsa-200405-20.xml http://securitytracker.com/id?1009784 http://www.ciac.org/ciac/bulletins/p-018.shtml http://www.debian.org/security/2004/dsa-483 http://www.mandriva.com/security/advisories?name=MDKSA-2004:034 http://www.osvdb.org/6421 http://www.redhat.com/support/errata/RHSA-2004-5 •