MySQL Anonymous Login Handshake Remote Information Disclosure

This script is Copyright (C) 2006-2011 Tenable Network Security, Inc.


Synopsis :

The remote database server is affected by an information disclosure
flaw.

Description :

The MySQL database server on the remote host reads from uninitialized
memory when processing a specially crafted login packet. An
unauthenticated attacker may be able to exploit this flaw to obtain
sensitive information from the affected host as returned in an error
packet.

See also :

http://www.securityfocus.com/archive/1/432733/30/0/threaded
http://dev.mysql.com/doc/refman/4.1/en/news-4-0-27.html
http://dev.mysql.com/doc/refman/4.1/en/news-4-1-19.html
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-10.html

Solution :

Upgrade to MySQL 4.0.27 / 4.1.19 / 5.0.21 / 5.1.10 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Databases

Nessus Plugin ID: 21632 ()

Bugtraq ID: 17780

CVE ID: CVE-2006-1516