{"vuid":"VU#516492","idnumber":"516492","name":"MySQL fails to validate length of password field","keywords":["MySQL","buffer overflow","password field","long string f characters","get_salt_from_password()","sql_acl.cc","ACL_USER","acl_init()","16 characters","set password"],"overview":"A vulnerability in MySQL could permit a malicious user to execute arbitrary code on the system.","clean_desc":"MySQL is a database system. MySQL contains a buffer overflow vulnerability in the processing of the password field of the MySQL database, specifically \"SET PASSWORD\". A malicious user who has the permissions to execute the \"ALTER TABLE\" command on tables in the \"mysql\" database may be able to exploit this vulnerability. MySQL3 versions 3.0.57 and earlier and MySQL4 versions 4.0.14 and earlier are reported to be vulnerable. An exploit has been posted publicly","impact":"Exploitation of this vulnerability could allow the malicious user to execute arbitrary code with the privileges of the mysqld process, by default user \"mysql\".","resolution":"This issue is resolved in MySQL versions 3.23.58 and 4.0.15. Upgrade or apply a patch as recommended by your vendor.","workarounds":"","sysaffected":"","thanks":"Thanks to Jedi/Sector One for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://www.mysql.com/","http://www.secunia.com/advisories/9709/"],"cveids":["CVE-2003-0780"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-09-11T15:27:10Z","publicdate":"2003-09-10T00:00:00Z","datefirstpublished":"2003-09-15T17:47:15Z","dateupdated":"2003-09-15T17:48:11Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"10","cam_attackeraccessrequired":"1","cam_scorecurrent":"1.6875","cam_scorecurrentwidelyknown":"1.6875","cam_scorecurrentwidelyknownexploited":"2.8125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.6875,"vulnote":null}