Lucene search

K
saintSAINT CorporationSAINT:E235BB888BE2610A3A153D3301BFB38C
HistorySep 06, 2006 - 12:00 a.m.

MySQL MaxDB WebDBM database name buffer overflow

2006-09-0600:00:00
SAINT Corporation
download.saintcorporation.com
6

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.967 High

EPSS

Percentile

99.6%

Added: 09/06/2006
CVE: CVE-2006-4305
BID: 19660
OSVDB: 28300

Background

MaxDB is a SAP-certified open-source database developed by MySQL.

Problem

A buffer overflow in MaxDB allows remote attackers to execute arbitrary commands by sending a long database name from a WebDBM client.

Resolution

Upgrade to MaxDB 7.6.00.31 or higher.

References

<http://archives.neohapsis.com/archives/bugtraq/2006-08/0512.html&gt;

Limitations

Exploit works with MaxDB 7.6.00.27.

Platforms

Windows

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.967 High

EPSS

Percentile

99.6%