Vulnerability Details : CVE-2004-0627
The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string.
Products affected by CVE-2004-0627
- cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-0627
53.96%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-0627
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2004-0627
-
http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html
Patch;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/184030
VU#184030 - MySQL fails to properly evaluate zero-length strings in the check_scramble_323() functionPatch;Third Party Advisory;US Government Resource
-
http://marc.info/?l=bugtraq&m=108904917528205&w=2
'MySQL Authentication Bypass' - MARC
Jump to