Vulnerability Name: | CVE-2006-2753 (CCN-26875) |
Assigned: | 2006-05-31 |
Published: | 2006-05-31 |
Updated: | 2019-12-17 |
Summary: | SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input. |
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Data Manipulation |
References: | Source: CCN Type: Full-Disclosure Mailing List, Thu Jun 01 2006 - 14:05:33 CDT rPSA-2006-0089-1 mysql mysql-bench mysql-server
Source: CONFIRM Type: UNKNOWN http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735
Source: MITRE Type: CNA CVE-2006-2753
Source: CCN Type: MySQL Web site MySQL AB :: MySQL Downloads
Source: CCN Type: Mac OS X 10.4.9 and Security Update 2007-003 About the security content of Mac OS X 10.4.9 and Security Update 2007-003
Source: CONFIRM Type: UNKNOWN http://docs.info.apple.com/article.html?artnum=305214
Source: APPLE Type: UNKNOWN APPLE-SA-2007-03-13
Source: CCN Type: MySQL Announcements, May 31 2006 7:33pm MySQL Lists: announce: MySQL 4.1.20 has been released
Source: CONFIRM Type: Patch http://lists.mysql.com/announce/364
Source: CCN Type: RHSA-2006-0544 mysql security update
Source: CCN Type: SA20365 MySQL Multibyte Encoding SQL Injection Vulnerability
Source: SECUNIA Type: UNKNOWN 20365
Source: SECUNIA Type: UNKNOWN 20489
Source: SECUNIA Type: UNKNOWN 20531
Source: SECUNIA Type: UNKNOWN 20541
Source: SECUNIA Type: UNKNOWN 20562
Source: SECUNIA Type: UNKNOWN 20625
Source: SECUNIA Type: UNKNOWN 20712
Source: CCN Type: SA24479 Mac OS X Security Update Fixes Multiple Vulnerabilities
Source: SECUNIA Type: UNKNOWN 24479
Source: CCN Type: SECTRACK ID: 1016216 MySQL Error in Parsing Multibyte Encoded Data in mysql_real_escape() Lets Remote Users Inject SQL Commands
Source: SECTRACK Type: UNKNOWN 1016216
Source: CCN Type: ASA-2006-120 MySQL security update (RHSA-2006-0544)1)
Source: CCN Type: Apple Mac OS X Web site Apple - Apple - Mac OS X - Leopard Sneak Peek
Source: DEBIAN Type: UNKNOWN DSA-1092
Source: DEBIAN Type: DSA-1092 mysql-dfsg-4.1 -- programming error
Source: CCN Type: GLSA-200606-13 MySQL: SQL Injection
Source: GENTOO Type: UNKNOWN GLSA-200606-13
Source: MANDRIVA Type: UNKNOWN MDKSA-2006:097
Source: REDHAT Type: UNKNOWN RHSA-2006:0544
Source: BID Type: UNKNOWN 18219
Source: CCN Type: BID-18219 MySQL Mysql_real_escape Function SQL Injection Vulnerability
Source: TRUSTIX Type: UNKNOWN 2006-0034
Source: CCN Type: USN-288-3 PostgreSQL client vulnerabilities
Source: UBUNTU Type: UNKNOWN USN-288-3
Source: CCN Type: USN-288-4 dovecot regression fix
Source: CCN Type: USN-303-1 MySQL vulnerability
Source: CERT Type: US Government Resource TA07-072A
Source: VUPEN Type: UNKNOWN ADV-2006-2105
Source: VUPEN Type: UNKNOWN ADV-2007-0930
Source: XF Type: UNKNOWN mysql-ascii-sql-injection(26875)
Source: XF Type: UNKNOWN mysql-ascii-sql-injection(26875)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10312
Source: UBUNTU Type: UNKNOWN USN-303-1
|
Vulnerable Configuration: | Configuration 1: cpe:/a:oracle:mysql:4.1.0:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.2:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.3:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.8:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.10:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.12:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.13:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.14:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.15:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.0:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.1:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.2:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.3:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.4:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.5:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.10:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.15:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.16:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.17:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.20:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.1:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.4:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.5:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.6:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.7:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.9:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.11:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.16:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.17:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.18:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.19:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.6:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.7:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.8:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.9:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.11:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.12:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.13:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.14:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.18:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.19:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.21:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1: cpe:/a:oracle:mysql:4.1.13:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.18:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.0:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.10:a:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.11:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.18:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.19:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.4:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:4.1.5:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.0:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.1:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.2:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.20:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.21:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.3:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.0.4:-:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.1.10:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql:5.1.9:*:*:*:*:*:*:*AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |