CVE-2012-2122

medium

Description

sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62, 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23, when running in certain environments with certain implementations of the memcmp function, allows remote attackers to bypass authentication by repeatedly authenticating with the same incorrect password, which eventually causes a token comparison to succeed due to an improperly-checked return value.

References

http://bugs.mysql.com/bug.php?id=64884

http://kb.askmonty.org/en/mariadb-5162-release-notes/

http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html

http://seclists.org/oss-sec/2012/q2/493

http://secunia.com/advisories/49417

http://secunia.com/advisories/53372

http://security.gentoo.org/glsa/glsa-201308-06.xml

http://securitytracker.com/id?1027143

http://www.exploit-db.com/exploits/19092

http://www.securityfocus.com/bid/53911

https://community.rapid7.com/community/metasploit/blog/2012/06/11/cve-2012-2122-a-tragically-comedic-security-flaw-in-mysql

Details

Source: MITRE

Published: 2012-06-26

Updated: 2014-02-21

Type: CWE-287

Risk Information

CVSS v2

Base Score: 5.1

Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 4.9

Severity: MEDIUM