Vulnerability Name:

CVE-2008-3963 (CCN-45042)

Assigned:2008-08-10
Published:2008-08-10
Updated:2019-12-17
Summary:MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b'' (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
3.0 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.7 Low (REDHAT CVSS v2 Vector: AV:A/AC:L/Au:S/C:N/I:N/A:P)
2.0 Low (REDHAT Temporal CVSS v2 Vector: AV:A/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-134
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: MySQL Bug #35658
An empty binary value leads to mysqld crash

Source: CONFIRM
Type: UNKNOWN
http://bugs.mysql.com/bug.php?id=35658

Source: MITRE
Type: CNA
CVE-2008-3963

Source: CONFIRM
Type: UNKNOWN
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html

Source: CONFIRM
Type: UNKNOWN
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html

Source: CONFIRM
Type: UNKNOWN
http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html

Source: CCN
Type: MySQL Web site
MySQL Downloads

Source: SUSE
Type: UNKNOWN
SUSE-SR:2008:025

Source: CCN
Type: RHSA-2009-1067
Moderate: Red Hat Application Stack v2.3 security and enhancement update

Source: CCN
Type: RHSA-2009-1289
Moderate: mysql security and bug fix update

Source: CCN
Type: SA31769
MySQL Empty Bit-String Literal Denial of Service

Source: SECUNIA
Type: Vendor Advisory
31769

Source: SECUNIA
Type: Vendor Advisory
32759

Source: SECUNIA
Type: UNKNOWN
32769

Source: SECUNIA
Type: Vendor Advisory
34907

Source: SECUNIA
Type: UNKNOWN
36566

Source: CCN
Type: SECTRACK ID: 1020858
MySQL Item_bin_string::Item_bin_string() Binary Value Processing Bug Lets Remote Authenticated Users Deny Service

Source: CCN
Type: ASA-2009-199
Red Hat Application Stack v2.3 security and enhancement update (RHSA-2009-1067)

Source: DEBIAN
Type: Patch
DSA-1783

Source: DEBIAN
Type: DSA-1783
mysql-dfsg-5.0 -- multiple vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2009:094

Source: CCN
Type: oss-security Mailing List, Tue, 9 Sep 2008 14:18:40 +0200
CVE request: MySQL empty bit-string literal server crash

Source: MLIST
Type: UNKNOWN
[oss-security] 20080909 CVE request: MySQL empty bit-string literal server crash

Source: MLIST
Type: UNKNOWN
[oss-security] 20080909 Re: CVE request: MySQL empty bit-string literal server crash

Source: REDHAT
Type: UNKNOWN
RHSA-2009:1067

Source: REDHAT
Type: UNKNOWN
RHSA-2009:1289

Source: CCN
Type: BID-31081
MySQL Empty Binary String Literal Remote Denial Of Service Vulnerability

Source: SECTRACK
Type: UNKNOWN
1020858

Source: UBUNTU
Type: UNKNOWN
USN-1397-1

Source: CCN
Type: USN-671-1
MySQL vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-671-1

Source: VUPEN
Type: Vendor Advisory
ADV-2008-2554

Source: CCN
Type: Gentoo Bugzilla Bug 237166
dev-db/mysql <5.0.66 b'' Server DoS (CVE-2008-3963)

Source: CONFIRM
Type: UNKNOWN
https://bugs.gentoo.org/237166

Source: XF
Type: UNKNOWN
mysql-bitstring-dos(45042)

Source: XF
Type: UNKNOWN
mysql-bitstring-dos(45042)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10521

Source: SUSE
Type: SUSE-SR:2008:025
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2009:001
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:oracle:mysql:5.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.3:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.10:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.15:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.16:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.17:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.20:-:*:*:*:*:*:*
  • OR cpe:/a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.24:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.30:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.36:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.44:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.54:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.56:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.60:-:*:*:*:*:*:*
  • OR cpe:/a:mysql:mysql:5.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.23:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.25:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.26:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.32:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.33:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.38:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.41:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.42:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.45:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.50:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.51:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.0.52:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.9:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.10:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.11:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.12:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.13:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.14:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.15:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.16:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.17:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.18:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.19:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.20:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.21:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.22:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:6.0.4:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.1.23:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:6.0.4:*:*:*:*:*:*:*
  • AND
  • cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_application_stack:2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20083963
    V
    CVE-2008-3963
    2017-09-27
    oval:org.mitre.oval:def:28888
    P
    RHSA-2009:1289 -- mysql security and bug fix update (Moderate)
    2015-08-17
    oval:org.mitre.oval:def:14934
    P
    USN-1397-1 -- MySQL vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:16963
    P
    USN-671-1 -- mysql-dfsg-5.0 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:7877
    P
    DSA-1783 mysql-dfsg-5.0 -- multiple vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:20178
    P
    DSA-1783-1 mysql-dfsg-5.0 - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:22888
    P
    ELSA-2009:1289: mysql security and bug fix update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:10521
    V
    MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b'' (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement.
    2013-04-29
    oval:com.redhat.rhsa:def:20091289
    P
    RHSA-2009:1289: mysql security and bug fix update (Moderate)
    2009-09-02
    oval:org.debian:def:1783
    V
    multiple vulnerabilities
    2009-04-29
    BACK
    mysql mysql 5.0.0
    mysql mysql 5.0.1
    mysql mysql 5.0.2
    mysql mysql 5.0.3
    mysql mysql 5.0.4
    mysql mysql 5.0.5
    mysql mysql 5.0.5.0.21
    mysql mysql 5.0.10
    mysql mysql 5.0.15
    mysql mysql 5.0.16
    mysql mysql 5.0.17
    mysql mysql 5.0.20
    mysql mysql 5.0.22.1.0.1
    mysql mysql 5.0.24
    mysql mysql 5.0.30
    mysql mysql 5.0.36
    mysql mysql 5.0.44
    mysql mysql 5.0.54
    mysql mysql 5.0.56
    mysql mysql 5.0.60
    mysql mysql 5.1.5
    mysql mysql 5.1.23
    oracle mysql 5.0.0 alpha
    oracle mysql 5.0.6
    oracle mysql 5.0.23
    oracle mysql 5.0.25
    oracle mysql 5.0.26
    oracle mysql 5.0.30 sp1
    oracle mysql 5.0.32
    oracle mysql 5.0.33
    oracle mysql 5.0.38
    oracle mysql 5.0.41
    oracle mysql 5.0.42
    oracle mysql 5.0.45
    oracle mysql 5.0.50
    oracle mysql 5.0.51
    oracle mysql 5.0.52
    oracle mysql 5.1
    oracle mysql 5.1.1
    oracle mysql 5.1.2
    oracle mysql 5.1.3
    oracle mysql 5.1.4
    oracle mysql 5.1.6
    oracle mysql 5.1.7
    oracle mysql 5.1.8
    oracle mysql 5.1.9
    oracle mysql 5.1.10
    oracle mysql 5.1.11
    oracle mysql 5.1.12
    oracle mysql 5.1.13
    oracle mysql 5.1.14
    oracle mysql 5.1.15
    oracle mysql 5.1.16
    oracle mysql 5.1.17
    oracle mysql 5.1.18
    oracle mysql 5.1.19
    oracle mysql 5.1.20
    oracle mysql 5.1.21
    oracle mysql 5.1.22
    oracle mysql 6.0.0
    oracle mysql 6.0.1
    oracle mysql 6.0.2
    oracle mysql 6.0.3
    oracle mysql 6.0.4
    mysql mysql 5.0.6
    mysql mysql 5.1.23
    mysql mysql 6.0.4
    canonical ubuntu 6.06
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    redhat enterprise linux 5
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.1 x86_64
    redhat rhel application stack 2
    mandrakesoft mandrake linux 2008.1
    canonical ubuntu 8.04
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0