Vulnerability Name: | CCN-3849 | ||||||
Published: | 2000-01-11 | ||||||
Updated: | 2000-01-11 | ||||||
Summary: | The MySQL default test account, which has GRANT privileges without a password could allow anyone to connect to the database. A remote attacker could use the test account to access the database. If used with other MySQL vulnerabilities (such as GRANT pwd), an attacker could remotely and anonymously compromise the database. | ||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||
Vulnerability Consequences: | Bypass Security | ||||||
References: | Source: CCN Type: BugTraq Mailing List, Tue Jan 11 2000 - 10:34:54 CST Serious bug in MySQL password handling Source: CCN Type: SuSE Security Announcement #38 MySQL 3.22.11-29 Source: XF Type: UNKNOWN mysql-test-db-connect(3849) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |