|Description||The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)|
|References||DSA-1071-1, DSA-1073-1, DSA-1079-1|
|NVD severity||medium (attack range: remote)|
|Debian Bugs||356751, 365938, 365939, 366043, 366044|
The information below is based on the following data on fixed versions.