DescriptionThe check_connection function in in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, web search, more)
ReferencesDSA-1071-1, DSA-1073-1, DSA-1079-1
NVD severitymedium (attack range: remote)
Debian Bugs356751, 365938, 365939, 366043, 366044
Debian/oldoldstablenot known to be vulnerable.
Debian/oldstablenot known to be vulnerable.
Debian/stablenot known to be vulnerable.
Debian/testingnot known to be vulnerable.
Debian/unstablenot known to be vulnerable.

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mysql-dfsgsource(unstable)(unfixed)low356751, 365939
mysql-dfsg-4.1source(unstable)(unfixed)low365939, 366043
mysql-dfsg-5.0source(unstable)5.0.21-1low365938, 365939, 366044

Search for package or bug name: Reporting problems