Vulnerability Details : CVE-2006-0903
MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.
Products affected by CVE-2006-0903
- cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.19:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.17:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.13:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.20:beta:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.21:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.57:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.15:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:3.23.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*
Threat overview for CVE-2006-0903
Top countries where our scanners detected CVE-2006-0903
Top open port discovered on systems with this issue
3306
IPs affected by CVE-2006-0903 4,778
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2006-0903!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2006-0903
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-0903
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
Vendor statements for CVE-2006-0903
-
Red Hat 2006-09-19Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 2.1 and 3: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=194613 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue has been fixed for Red Hat Enterprise Linux 4 in RHSA-2006:0544.
References for CVE-2006-0903
-
http://www.redhat.com/support/errata/RHSA-2007-0083.html
-
http://rst.void.ru/papers/advisory39.txt
-
http://www.ubuntu.com/usn/usn-274-2
-
https://usn.ubuntu.com/274-1/
-
http://www.debian.org/security/2006/dsa-1073
-
http://www.securityfocus.com/bid/16850
-
http://www.debian.org/security/2006/dsa-1079
-
http://www.redhat.com/support/errata/RHSA-2008-0364.html
-
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:064
-
http://www.vupen.com/english/advisories/2006/0752
-
http://securitytracker.com/id?1015693
-
http://bugs.mysql.com/bug.php?id=17667
-
http://www.debian.org/security/2006/dsa-1071
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24966
-
http://www.redhat.com/support/errata/RHSA-2006-0544.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915
Jump to