what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2006.111

Mandriva Linux Security Advisory 2006.111
Posted Jun 27, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-111 - Mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function. MySQL 4.0.18 in Corporate 3.0 and MNF 2.0 is not affected by this issue.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2006-3081
SHA-256 | f8ed87c094831924481b8145d31f992ec2b91591761234bc0da068928d88502d

Mandriva Linux Security Advisory 2006.111

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:111
https://www.mandriva.com/security/
_______________________________________________________________________

Package : MySQL
Date : June 23, 2006
Affected: 10.2, 2006.0
_______________________________________________________________________

Problem Description:

Mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before
5.1.6 allows remote authorized users to cause a denial of service (crash)
via a NULL second argument to the str_to_date function.

MySQL 4.0.18 in Corporate 3.0 and MNF 2.0 is not affected by this issue.

Packages have been patched to correct this issue.
_______________________________________________________________________

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3081
_______________________________________________________________________

Updated Packages:

Mandriva Linux 10.2:
78e8411d4173067449ab40b253359584 10.2/RPMS/libmysql14-4.1.11-1.6.102mdk.i586.rpm
1b8c46014749729fd853c6dcee91eaed 10.2/RPMS/libmysql14-devel-4.1.11-1.6.102mdk.i586.rpm
996f92c1d1cb685938a1b019d8b637c0 10.2/RPMS/MySQL-4.1.11-1.6.102mdk.i586.rpm
766fa948a6d3e0094658aa936a76e203 10.2/RPMS/MySQL-bench-4.1.11-1.6.102mdk.i586.rpm
587b166b5e24e39df778d1a49ca26c60 10.2/RPMS/MySQL-client-4.1.11-1.6.102mdk.i586.rpm
26e3fd9cf0a5977e2b934c12ad9500fc 10.2/RPMS/MySQL-common-4.1.11-1.6.102mdk.i586.rpm
66f223fa9cfe196c01c6e4b311d70a65 10.2/RPMS/MySQL-Max-4.1.11-1.6.102mdk.i586.rpm
550a497e8f5fb748b9a91a0717da6c48 10.2/RPMS/MySQL-NDB-4.1.11-1.6.102mdk.i586.rpm
c3cd6a33370387b6b7ef26810d04ed5e 10.2/SRPMS/MySQL-4.1.11-1.6.102mdk.src.rpm

Mandriva Linux 10.2/X86_64:
b93aa5af71b0fc8752b59ea9e137fbb9 x86_64/10.2/RPMS/lib64mysql14-4.1.11-1.6.102mdk.x86_64.rpm
97baf24556b164bd67d7456f662788a2 x86_64/10.2/RPMS/lib64mysql14-devel-4.1.11-1.6.102mdk.x86_64.rpm
2e1874294dd1bd7bb66eca3db4b84f9f x86_64/10.2/RPMS/MySQL-4.1.11-1.6.102mdk.x86_64.rpm
e59c30459703a1143a6a5c2aa962fdeb x86_64/10.2/RPMS/MySQL-bench-4.1.11-1.6.102mdk.x86_64.rpm
921411f6d52933199902eae720bdfc4c x86_64/10.2/RPMS/MySQL-client-4.1.11-1.6.102mdk.x86_64.rpm
ee8319140b47877d3920a6f789f10076 x86_64/10.2/RPMS/MySQL-common-4.1.11-1.6.102mdk.x86_64.rpm
5ecce7afbba4fd0ddd9e36ef068cb007 x86_64/10.2/RPMS/MySQL-Max-4.1.11-1.6.102mdk.x86_64.rpm
7f30cc287096f0a28347b9a18454bdf8 x86_64/10.2/RPMS/MySQL-NDB-4.1.11-1.6.102mdk.x86_64.rpm
c3cd6a33370387b6b7ef26810d04ed5e x86_64/10.2/SRPMS/MySQL-4.1.11-1.6.102mdk.src.rpm

Mandriva Linux 2006.0:
bbad68193933b00b85f243e80280f954 2006.0/RPMS/libmysql14-4.1.12-4.3.20060mdk.i586.rpm
c8f89626e74f928e1f997d547ea9e5ff 2006.0/RPMS/libmysql14-devel-4.1.12-4.3.20060mdk.i586.rpm
7274a11988a77408823e0fef2375cc16 2006.0/RPMS/MySQL-4.1.12-4.3.20060mdk.i586.rpm
e63c7660cb86a3e0d3240d00a43e53a9 2006.0/RPMS/MySQL-bench-4.1.12-4.3.20060mdk.i586.rpm
aa902a285d22f9df2a33dc7d9490c3f7 2006.0/RPMS/MySQL-client-4.1.12-4.3.20060mdk.i586.rpm
633d3a283dd19ea2a51448b815ad53a9 2006.0/RPMS/MySQL-common-4.1.12-4.3.20060mdk.i586.rpm
96ce79cfbda19d2af7ba81de922561c1 2006.0/RPMS/MySQL-Max-4.1.12-4.3.20060mdk.i586.rpm
0e83d8f9db5f77d08a0c876befbe1a67 2006.0/RPMS/MySQL-NDB-4.1.12-4.3.20060mdk.i586.rpm
7e92a87a1fbe7b3dad96372a678a2c65 2006.0/SRPMS/MySQL-4.1.12-4.3.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
3abed6dfe1aff3e142effab7438f1813 x86_64/2006.0/RPMS/lib64mysql14-4.1.12-4.3.20060mdk.x86_64.rpm
d29d7cc058e7cd5af8068db37e2170e8 x86_64/2006.0/RPMS/lib64mysql14-devel-4.1.12-4.3.20060mdk.x86_64.rpm
4dd7efc9fcd7fd77cc6a5f4b9e2294f5 x86_64/2006.0/RPMS/MySQL-4.1.12-4.3.20060mdk.x86_64.rpm
7b2f19ea6fd61a972038ea79063167e3 x86_64/2006.0/RPMS/MySQL-bench-4.1.12-4.3.20060mdk.x86_64.rpm
434eaff2f79e6dcb6d4ad6ca7d538259 x86_64/2006.0/RPMS/MySQL-client-4.1.12-4.3.20060mdk.x86_64.rpm
49aa9dcfbe79d8a91ad6823d505f19ac x86_64/2006.0/RPMS/MySQL-common-4.1.12-4.3.20060mdk.x86_64.rpm
bfa5996ca7e57f071fcc4a2574883a8e x86_64/2006.0/RPMS/MySQL-Max-4.1.12-4.3.20060mdk.x86_64.rpm
9df2f30b72c53bd4be9c92b4146e5c79 x86_64/2006.0/RPMS/MySQL-NDB-4.1.12-4.3.20060mdk.x86_64.rpm
7e92a87a1fbe7b3dad96372a678a2c65 x86_64/2006.0/SRPMS/MySQL-4.1.12-4.3.20060mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

https://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEm+2vmqjQ0CJFipgRAp03AKCBqLEYfQYn+lpIV8ORd0ET05DCKwCgnaYx
58aB4ezFDNLNyf9NyjyTGIs=
=Hla8
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close