Vulnerability Name:

CVE-2007-5925 (CCN-38284)

Assigned:2007-11-05
Published:2007-11-05
Updated:2018-10-03
Summary:The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.
CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
3.1 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
3.1 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-20
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: Full-Disclosure Mailing List, Tue Nov 06 2007 - 00:38:36 CST
MySQL 5.x DoS (unknown)

Source: CONFIRM
Type: UNKNOWN
http://bugs.gentoo.org/show_bug.cgi?id=198988

Source: CCN
Type: MySQL Bug #32125
Database crash due to ha_innodb.cc:3896: ulint convert_search_mode_to_innobase

Source: CONFIRM
Type: UNKNOWN
http://bugs.mysql.com/bug.php?id=32125

Source: MITRE
Type: CNA
CVE-2007-5925

Source: FULLDISC
Type: UNKNOWN
20071106 MySQL 5.x DoS (unknown)

Source: SUSE
Type: UNKNOWN
SUSE-SR:2008:003

Source: CCN
Type: RHSA-2007-1155
Important: mysql security update

Source: CCN
Type: RHSA-2007-1157
Important: mysql security update

Source: CCN
Type: SA27568
MySQL InnoDB Denial of Service Vulnerability

Source: SECUNIA
Type: UNKNOWN
27568

Source: SECUNIA
Type: UNKNOWN
27649

Source: SECUNIA
Type: UNKNOWN
27823

Source: SECUNIA
Type: UNKNOWN
28025

Source: SECUNIA
Type: UNKNOWN
28040

Source: SECUNIA
Type: UNKNOWN
28099

Source: SECUNIA
Type: UNKNOWN
28108

Source: SECUNIA
Type: UNKNOWN
28128

Source: SECUNIA
Type: UNKNOWN
28838

Source: GENTOO
Type: UNKNOWN
GLSA-200711-25

Source: CCN
Type: SECTRACK ID: 1018978
MySQL convert_search_mode_to_innobase() Bug Lets Remote Authenticated Users Deny Service

Source: SLACKWARE
Type: UNKNOWN
SSA:2007-348-01

Source: CCN
Type: ASA-2007-535
MySQL security update (RHSA-2007-1155)

Source: CCN
Type: ASA-2008-018
mysql security update (RHSA-2007-1157)

Source: DEBIAN
Type: UNKNOWN
DSA-1413

Source: DEBIAN
Type: DSA-1413
mysql -- multiple vulnerabilities

Source: CCN
Type: GLSA-200711-25
MySQL: Denial of Service

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:243

Source: CCN
Type: MySQL Web site
MySQL AB :: The world's most popular open source database

Source: REDHAT
Type: UNKNOWN
RHSA-2007:1155

Source: REDHAT
Type: UNKNOWN
RHSA-2007:1157

Source: BID
Type: UNKNOWN
26353

Source: CCN
Type: BID-26353
MySQL Server InnoDB CONVERT_SEARCH_MODE_TO_INNOBASE Function Denial Of Service Vulnerability

Source: SECTRACK
Type: UNKNOWN
1018978

Source: UBUNTU
Type: UNKNOWN
USN-1397-1

Source: CCN
Type: USN-559-1
MySQL vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2007-3903

Source: XF
Type: UNKNOWN
mysql-hainnodb-dos(38284)

Source: XF
Type: UNKNOWN
mysql-hainnodb-dos(38284)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11390

Source: UBUNTU
Type: UNKNOWN
USN-559-1

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-4465

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-4471

Source: SUSE
Type: SUSE-SR:2008:003
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mysql:mysql:*:*:*:*:*:*:*:* (Version <= 5.1.23_bk)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:oracle:mysql:5.1.23:bk:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.44:-:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_application_stack:2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:es:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20075925
    V
    CVE-2007-5925
    2015-11-16
    oval:org.mitre.oval:def:14934
    P
    USN-1397-1 -- MySQL vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:17493
    P
    USN-559-1 -- mysql-dfsg-5.0 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:20366
    P
    DSA-1413-1 mysql - multiple
    2014-06-23
    oval:org.mitre.oval:def:21851
    P
    ELSA-2007:1155: mysql security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:11390
    V
    The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.
    2013-04-29
    oval:com.redhat.rhsa:def:20071155
    P
    RHSA-2007:1155: mysql security update (Important)
    2007-12-18
    BACK
    mysql mysql *
    mysql mysql 5.1.23_bk
    mysql mysql 5.0.44
    gentoo linux *
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    canonical ubuntu 6.06
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.04
    redhat enterprise linux 5
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2007.1
    redhat rhel application stack 2
    redhat enterprise linux 4.6.z ga
    redhat enterprise linux 4.6.z ga