CVE-2005-2558
Published Aug 16, 2005
Last updated 5 years ago
Overview
- Description
- Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7" }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC" }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67" }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83" }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C" }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483" }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9" }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4" } ], "operator": "OR" } ] } ]