SynopsisThe remote database server is affected by multiple vulnerabilities.
DescriptionThe version of MySQL Community Server installed on the remote host is earlier than 5.1.47 / 5.0.91 and is, therefore, potentially affected by the following vulnerabilities :
- The server may continue reading packets indefinitely if it receives a packet larger than the maximum size of one packet, which could allow an unauthenticated, remote attacker to consume a high level of CPU and bandwidth. (Bug #50974)
- Using an overly long table name argument to the 'COM_FIELD_LIST' command, an authenticated user can overflow a buffer and execute arbitrary code on the affected host. (Bug #53237)
- Using a specially crafted table name argument to 'COM_FIELD_LIST', an authenticated user can bypass almost all forms of checks for privileges and table- level grants. (Bug #53371)
SolutionUpgrade to MySQL Community Server 5.1.47 / 5.0.91 or later.