Vulnerability Details : CVE-2006-1518
Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-1518
- cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*
Threat overview for CVE-2006-1518
Top countries where our scanners detected CVE-2006-1518
Top open port discovered on systems with this issue
3306
IPs affected by CVE-2006-1518 599
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2006-1518!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2006-1518
38.65%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1518
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
References for CVE-2006-1518
-
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html
-
http://www.securityfocus.com/bid/17780
-
http://secunia.com/advisories/20457
About Secunia Research | Flexera
-
http://securityreason.com/securityalert/839
-
http://www.debian.org/security/2006/dsa-1073
-
http://securitytracker.com/id?1016016
Patch
-
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html
Patch
-
http://www.kb.cert.org/vuls/id/602457
Patch;Third Party Advisory;US Government Resource
-
http://www.securityfocus.com/archive/1/432734/100/0/threaded
-
http://secunia.com/advisories/20762
-
http://www.debian.org/security/2006/dsa-1079
-
http://secunia.com/advisories/20241
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/26232
-
http://secunia.com/advisories/20333
-
http://www.novell.com/linux/security/advisories/2006-06-02.html
Security - Support | SUSE
-
http://www.debian.org/security/2006/dsa-1071
-
http://www.vupen.com/english/advisories/2006/1633
-
http://www.wisec.it/vulns.php?page=8
Patch
-
http://secunia.com/advisories/19929
Patch;Vendor Advisory
-
http://secunia.com/advisories/20253
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939
Patch
Jump to