sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1071-1 | New MySQL 3.23 packages fix several vulnerabilities |
Debian DSA |
DSA-1073-1 | New MySQL 4.1 packages fix several vulnerabilities |
Debian DSA |
DSA-1079-1 | New MySQL 4.0 packages fix several vulnerabilities |
EUVD |
EUVD-2006-1521 | sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message. |
Ubuntu USN |
USN-283-1 | MySQL vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-07T17:12:22.483Z
Reserved: 2006-03-30T00:00:00
Link: CVE-2006-1517
No data.
Status : Deferred
Published: 2006-05-05T12:46:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2006-1517
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN