This script is Copyright (C) 2003-2014 Tenable Network Security, Inc.
The remote database server is susceptible to a buffer overflow attack.
According to its banner, the version of MySQL installed on the remote
host fails to validate the length of a user-supplied password in the
'User' table in the 'get_salt_from_password()' function. Using a
specially crafted value for a new password, an authenticated attacker
with the 'ALTER DATABASE' privilege may be able to leverage this issue
to trigger a buffer overflow and execute arbitrary code subject to the
privileges under which the database service runs.
See also :
Upgrade to MySQL 3.23.58 / 4.0.15 or later.
Risk factor :
High / CVSS Base Score : 9.0
CVSS Temporal Score : 7.4
Public Exploit Available : true
Nessus Plugin ID: 11842 ()
Bugtraq ID: 8590
CVE ID: CVE-2003-0780
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.