CVE-2006-1516

NameCVE-2006-1516
DescriptionThe check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-1071-1, DSA-1073-1, DSA-1079-1
NVD severitymedium (attack range: remote)
Debian Bugs356751, 365938, 365939, 366043, 366044
Debian/oldstablenot known to be vulnerable.
Debian/stablenot known to be vulnerable.
Debian/testingnot known to be vulnerable.
Debian/unstablenot known to be vulnerable.

The information above is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mysqlsource(unstable)(unfixed)low365939
mysqlsourcewoody3.23.49-8.15mediumDSA-1071-1
mysql-dfsgsource(unstable)(unfixed)low356751, 365939
mysql-dfsgsourcesarge4.0.24-10sarge2mediumDSA-1079-1
mysql-dfsg-4.1source(unstable)(unfixed)low365939, 366043
mysql-dfsg-4.1sourcesarge4.1.11a-4sarge3mediumDSA-1073-1
mysql-dfsg-5.0source(unstable)5.0.21-1low365938, 365939, 366044

Search for package or bug name: Reporting problems