{"osvdb": [{"lastseen": "2017-04-28T13:20:15", "bulletinFamily": "software", "description": "# No description provided by the source\n\n## References:\nVendor URL: http://www.mysql.com/\nISS X-Force ID: 6419\n[CVE-2001-1454](https://vulners.com/cve/CVE-2001-1454)\nCERT VU: 367320\n", "modified": "2001-02-09T22:23:44", "published": "2001-02-09T22:23:44", "href": "https://vulners.com/osvdb/OSVDB:18894", "id": "OSVDB:18894", "title": "MySQL drop database Request Remote Overflow", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2019-01-16T20:06:03", "bulletinFamily": "scanner", "description": "The version of MySQL installed on the remote host is affected by the\nfollowing vulnerabilities :\n\n - A buffer overflow in libmysqlclient.so allows a remote \n attacker to execute arbitrary code via a long host \n parameter. (CVE-2001-1453)\n\n - A buffer overflow allows a remote attacker to execute \n arbitrary code via a long DROP DATABASE. \n (CVE-2001-1454)", "modified": "2018-07-16T00:00:00", "published": "2012-01-18T00:00:00", "id": "MYSQL_3_23_33.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=17818", "title": "MySQL < 3.23.33 Multiple Buffer Overflows", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(17818);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/07/16 14:09:12\");\n\n script_cve_id(\"CVE-2001-1453\", \"CVE-2001-1454\");\n script_bugtraq_id(2262);\n script_xref(name:\"CERT\", value:\"123384\");\n script_xref(name:\"CERT\", value:\"367320\");\n\n script_name(english:\"MySQL < 3.23.33 Multiple Buffer Overflows\");\n script_summary(english:\"Checks version of MySQL Server\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote database server is vulnerable to several buffer\noverflow attacks.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of MySQL installed on the remote host is affected by the\nfollowing vulnerabilities :\n\n - A buffer overflow in libmysqlclient.so allows a remote \n attacker to execute arbitrary code via a long host \n parameter. (CVE-2001-1453)\n\n - A buffer overflow allows a remote attacker to execute \n arbitrary code via a long DROP DATABASE. \n (CVE-2001-1454)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5396a2f5\");\n script_set_attribute(attribute:\"see_also\", value:\"http://dev.mysql.com/doc/refman/4.1/en/news-3-23-33.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5396a2f5\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to MySQL version 3.23.33 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2001/02/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/01/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mysql:mysql\");\n script_end_attributes();\n \n script_category(ACT_GATHER_INFO);\n script_family(english:\"Databases\");\n\n script_copyright(english:\"This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mysql_version.nasl\", \"mysql_login.nasl\");\n script_require_keys(\"Settings/ParanoidReport\");\n script_require_ports(\"Services/mysql\", 3306);\n\n exit(0);\n}\n\n\ninclude(\"mysql_version.inc\");\n\nmysql_check_version(fixed:'3.23.33', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}