Vulnerability Name:

CVE-2006-1516 (CCN-26236)

Assigned:2006-05-02
Published:2006-05-02
Updated:2019-12-17
Summary:The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
4.1 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
4.1 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: BugTraq Mailing List, Tue May 02 2006 - 08:40:02 CDT
MySQL Anonymous Login Handshake - Information Leakage.

Source: CONFIRM
Type: UNKNOWN
http://bugs.debian.org/365938

Source: MITRE
Type: CNA
CVE-2006-1516

Source: CONFIRM
Type: Patch
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html

Source: CCN
Type: Mac OS X 10.4.9 and Security Update 2007-003
About the security content of Mac OS X 10.4.9 and Security Update 2007-003

Source: CONFIRM
Type: UNKNOWN
http://docs.info.apple.com/article.html?artnum=305214

Source: APPLE
Type: UNKNOWN
APPLE-SA-2007-03-13

Source: SUSE
Type: UNKNOWN
SUSE-SA:2006:036

Source: CCN
Type: RHSA-2006-0544
mysql security update

Source: CCN
Type: SA19929
MySQL Information Disclosure and Buffer Overflow Vulnerabilities

Source: SECUNIA
Type: Patch, Vendor Advisory
19929

Source: SECUNIA
Type: UNKNOWN
20002

Source: SECUNIA
Type: UNKNOWN
20073

Source: SECUNIA
Type: UNKNOWN
20076

Source: SECUNIA
Type: UNKNOWN
20223

Source: SECUNIA
Type: UNKNOWN
20241

Source: SECUNIA
Type: UNKNOWN
20253

Source: SECUNIA
Type: UNKNOWN
20333

Source: SECUNIA
Type: UNKNOWN
20424

Source: SECUNIA
Type: UNKNOWN
20457

Source: SECUNIA
Type: UNKNOWN
20625

Source: SECUNIA
Type: UNKNOWN
20762

Source: CCN
Type: SA24479
Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
24479

Source: CCN
Type: SA29847
Sun Solaris MySQL Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
29847

Source: SREASON
Type: UNKNOWN
840

Source: CCN
Type: SECTRACK ID: 1016017
MySQL Anonymous Login Processing May Disclose Some Memory Contents to Remote Users

Source: SECTRACK
Type: Patch
1016017

Source: SLACKWARE
Type: UNKNOWN
SSA:2006-155-01

Source: SUNALERT
Type: UNKNOWN
236703

Source: CCN
Type: Sun Alert ID: 236703
Multiple Security Vulnerabilities May Affect MySQL 4.0.x Bundled With Solaris 10

Source: CCN
Type: ASA-2006-120
MySQL security update (RHSA-2006-0544)1)

Source: CCN
Type: ASA-2008-187
Multiple Security Vulnerabilities May Affect MySQL 4.0.x Bundled With Solaris 10 (Sun 236703)

Source: CCN
Type: Apple Mac OS X Web site
Apple - Apple - Mac OS X - Leopard Sneak Peek

Source: DEBIAN
Type: UNKNOWN
DSA-1071

Source: DEBIAN
Type: UNKNOWN
DSA-1073

Source: DEBIAN
Type: UNKNOWN
DSA-1079

Source: DEBIAN
Type: DSA-1071
mysql -- several vulnerabilities

Source: DEBIAN
Type: DSA-1073
mysql-dfsg-4.1 -- several vulnerabilities

Source: DEBIAN
Type: DSA-1079
mysql-dfsg -- several vulnerabilities

Source: CCN
Type: GLSA-200605-13
MySQL: Information leakage

Source: GENTOO
Type: UNKNOWN
GLSA-200605-13

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:084

Source: CCN
Type: MySQL Web site
MySQL AB :: The world's most popular open source database

Source: SUSE
Type: UNKNOWN
SUSE-SR:2006:012

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0544

Source: BUGTRAQ
Type: UNKNOWN
20060502 MySQL Anonymous Login Handshake - Information Leakage.

Source: BUGTRAQ
Type: UNKNOWN
20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage

Source: BID
Type: UNKNOWN
17780

Source: CCN
Type: BID-17780
MySQL Remote Information Disclosure and Buffer Overflow Vulnerabilities

Source: TRUSTIX
Type: UNKNOWN
2006-0028

Source: CCN
Type: TLSA-2006-11
Multiple vulnerabilities exist in MySQL

Source: CCN
Type: USN-283-1
MySQL vulnerabilities

Source: CERT
Type: US Government Resource
TA07-072A

Source: VUPEN
Type: UNKNOWN
ADV-2006-1633

Source: VUPEN
Type: UNKNOWN
ADV-2007-0930

Source: VUPEN
Type: UNKNOWN
ADV-2008-1326

Source: MISC
Type: Patch
http://www.wisec.it/vulns.php?page=7

Source: XF
Type: UNKNOWN
mysql-login-packet-info-disclosure(26236)

Source: XF
Type: UNKNOWN
mysql-login-packet-info-disclosure(26236)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9918

Source: UBUNTU
Type: UNKNOWN
USN-283-1

Source: SUSE
Type: SUSE-SA:2006:036
mysql remote code execution

Source: SUSE
Type: SUSE-SR:2006:012
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:oracle:mysql:4.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.3:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.8:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.10:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.12:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.13:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.14:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.15:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.3:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.10:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.15:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.16:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.17:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.24:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.25:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.26:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.9:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.11:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.16:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.17:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.18:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.18:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:oracle:mysql:4.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.25:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.13:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.24:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.26:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.10:a:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.11:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.18:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:4.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.20:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.3:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.9:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::64bit:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20061516
    V
    CVE-2006-1516
    2015-11-16
    oval:org.mitre.oval:def:9918
    V
    The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
    2013-04-29
    oval:com.redhat.rhsa:def:20060544
    P
    RHSA-2006:0544: mysql security update (Important)
    2006-06-09
    oval:org.debian:def:1079
    V
    several vulnerabilities
    2006-05-29
    oval:org.debian:def:1071
    V
    several vulnerabilities
    2006-05-22
    oval:org.debian:def:1073
    V
    several vulnerabilities
    2006-05-22
    BACK
    mysql mysql 4.1.0
    mysql mysql 4.1.3
    mysql mysql 4.1.8
    mysql mysql 4.1.10
    mysql mysql 4.1.12
    mysql mysql 4.1.13
    mysql mysql 4.1.14
    mysql mysql 4.1.15
    mysql mysql 5.0.1
    mysql mysql 5.0.2
    mysql mysql 5.0.3
    mysql mysql 5.0.4
    mysql mysql 5.0.5
    mysql mysql 5.0.10
    mysql mysql 5.0.15
    mysql mysql 5.0.16
    mysql mysql 5.0.17
    oracle mysql 4.0.0
    oracle mysql 4.0.1
    oracle mysql 4.0.2
    oracle mysql 4.0.3
    oracle mysql 4.0.4
    oracle mysql 4.0.5
    oracle mysql 4.0.5a
    oracle mysql 4.0.6
    oracle mysql 4.0.7
    oracle mysql 4.0.7 gamma
    oracle mysql 4.0.8
    oracle mysql 4.0.8 gamma
    oracle mysql 4.0.9
    oracle mysql 4.0.9 gamma
    oracle mysql 4.0.10
    oracle mysql 4.0.11
    oracle mysql 4.0.11 gamma
    oracle mysql 4.0.12
    oracle mysql 4.0.13
    oracle mysql 4.0.14
    oracle mysql 4.0.15
    oracle mysql 4.0.16
    oracle mysql 4.0.17
    oracle mysql 4.0.18
    oracle mysql 4.0.19
    oracle mysql 4.0.20
    oracle mysql 4.0.21
    oracle mysql 4.0.23
    oracle mysql 4.0.24
    oracle mysql 4.0.25
    oracle mysql 4.0.26
    oracle mysql 4.1.0 alpha
    oracle mysql 4.1.2 alpha
    oracle mysql 4.1.3 beta
    oracle mysql 4.1.4
    oracle mysql 4.1.5
    oracle mysql 4.1.6
    oracle mysql 4.1.7
    oracle mysql 4.1.9
    oracle mysql 4.1.11
    oracle mysql 4.1.16
    oracle mysql 4.1.17
    oracle mysql 4.1.18
    oracle mysql 5.0.0 alpha
    oracle mysql 5.0.3 beta
    oracle mysql 5.0.6
    oracle mysql 5.0.7
    oracle mysql 5.0.8
    oracle mysql 5.0.9
    oracle mysql 5.0.11
    oracle mysql 5.0.12
    oracle mysql 5.0.13
    oracle mysql 5.0.14
    oracle mysql 5.0.18
    mysql mysql 4.0.18
    mysql mysql 4.0.20
    mysql mysql 4.0.17
    mysql mysql 4.0.23
    mysql mysql 4.0.25
    mysql mysql 4.1.13
    mysql mysql 5.0.18
    mysql mysql 4.0.1
    mysql mysql 4.0.10
    mysql mysql 4.0.11
    mysql mysql 4.0.11 gamma
    mysql mysql 4.0.12
    mysql mysql 4.0.13
    mysql mysql 4.0.14
    mysql mysql 4.0.15
    mysql mysql 4.0.2
    mysql mysql 4.0.21
    mysql mysql 4.0.24
    mysql mysql 4.0.26
    mysql mysql 4.0.3
    mysql mysql 4.0.4
    mysql mysql 4.0.5
    mysql mysql 4.0.5a
    mysql mysql 4.0.6
    mysql mysql 4.0.7
    mysql mysql 4.0.7 gamma
    mysql mysql 4.0.8
    mysql mysql 4.0.8 gamma
    mysql mysql 4.0.9
    mysql mysql 4.0.9 gamma
    mysql mysql 4.1.0.0
    mysql mysql 4.1.10a
    mysql mysql 4.1.11
    mysql mysql 4.1.18
    mysql mysql 4.1.2 alpha
    mysql mysql 4.1.3 beta
    mysql mysql 4.1.4
    mysql mysql 4.1.5
    mysql mysql 5.0.0.0
    mysql mysql 5.0.0 alpha
    mysql mysql 5.0.1
    mysql mysql 5.0.2
    mysql mysql 5.0.20
    mysql mysql 5.0.3
    mysql mysql 5.0.4
    mysql mysql 5.1.9
    debian debian linux 3.0
    gentoo linux *
    suse linux enterprise server 8
    suse suse linux 9.1
    suse suse linux 9.2
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    sun solaris 10
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    mandrakesoft mandrake multi network firewall 2.0
    suse suse linux 10.0
    mandrakesoft mandrake linux 2006
    suse suse linux 10.1
    mandrakesoft mandrake linux 2006
    mandrakesoft mandrake linux corporate server 3.0
    turbolinux turbolinux fuji
    turbolinux turbolinux personal *
    turbolinux turbolinux home *
    turbolinux turbolinux multimedia *
    suse suse linux 9.3