Vulnerability Name: | CVE-2004-0627 (CCN-16604) | ||||||||
Assigned: | 2004-07-05 | ||||||||
Published: | 2004-07-05 | ||||||||
Updated: | 2019-12-17 | ||||||||
Summary: | The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Mon Jul 05 2004 - 07:21:41 CDT MySQL Authentication Bypass Source: VULNWATCH Type: Patch, Vendor Advisory 20040705 MySQL Authentication Bypass Source: MITRE Type: CNA CVE-2004-0627 Source: CCN Type: MySQL Web site MySQL 4.1 Downloads Source: BUGTRAQ Type: UNKNOWN 20040705 MySQL Authentication Bypass Source: CCN Type: US-CERT VU#184030 MySQL fails to properly evaluate zero-length strings in the check_scramble_323() function Source: CERT-VN Type: Patch, Third Party Advisory, US Government Resource VU#184030 Source: CCN Type: OSVDB ID: 7475 MySQL Zero-length Scrambled String Crafted Packet Authentication Bypass Source: CCN Type: BID-10654 MySQL Authentication Bypass Vulnerability Source: XF Type: UNKNOWN mysql-checkscramble323-unauthorized-access(16604) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |