TITLE: MySQL Set Password Privilege Escalation Vulnerability SECUNIA ADVISORY ID: SA9709 VERIFY ADVISORY: http://www.secunia.com/advisories/9709/ CRITICAL: Not critical IMPACT: Privilege escalation WHERE: Local system SOFTWARE: MySQL 3.x MySQL 4.x DESCRIPTION: A vulnerability has been identified in MySQL, which can be exploited by malicious users to escalate their privileges on a vulnerable system. The vulnerability is caused due to a boundary error when checking passwords before hashing and storing them in the "User" table. This can be exploited to cause a buffer overflow by supplying a value longer than 16 characters using "set password". Successful exploitation allows malicious MySQL users with global administrative privileges to execute arbitrary code on the system with the privileges of the MySQL server. The vulnerability has been reported in versions 4.0.14 and 3.0.57. However, prior versions may also be affected. SOLUTION: Update to version 4.0.15: http://www.mysql.com/downloads/mysql-4.0.html REPORTED BY / CREDITS: Frank Denis (Jedi/Sector One) ORIGINAL ADVISORY: http://lists.mysql.com/list.php?list=announce&post=168 ---------------------------------------------------------------------- Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Contact details: Web : http://www.secunia.com/ E-mail : support@secunia.com Tel : +45 7020 5144 Fax : +45 7020 5145 ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://www.secunia.com/sec_adv_unsubscribe/?email=packet@packetstormsecurity.org ----------------------------------------------------------------------