Vulnerability Details : CVE-2006-3081
Potential exploit
mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.
Vulnerability category: Denial of service
Products affected by CVE-2006-3081
- cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*
Threat overview for CVE-2006-3081
Top countries where our scanners detected CVE-2006-3081
Top open port discovered on systems with this issue
3306
IPs affected by CVE-2006-3081 616
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2006-3081!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2006-3081
8.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-3081
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST |
References for CVE-2006-3081
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27212
-
http://www.redhat.com/support/errata/RHSA-2007-0083.html
-
http://www.us-cert.gov/cas/techalerts/TA06-208A.html
Page Not Found | CISAUS Government Resource
-
http://www.securityfocus.com/archive/1/437277
-
http://docs.info.apple.com/article.html?artnum=305214
-
http://www.securityfocus.com/archive/1/437145
-
http://secunia.com/advisories/24479
About Secunia Research | Flexera
-
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Page Not Found | CISAUS Government Resource
-
http://www.debian.org/security/2006/dsa-1112
-
http://secunia.com/advisories/20871
Vendor Advisory
-
http://secunia.com/advisories/20832
Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516
-
http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html
-
http://www.securityfocus.com/bid/18439
Exploit
-
http://www.vupen.com/english/advisories/2007/0930
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
https://usn.ubuntu.com/306-1/
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913
-
http://secunia.com/advisories/19929
Vendor Advisory
-
http://www.securityfocus.com/archive/1/437571/100/0/threaded
-
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
-
http://bugs.mysql.com/bug.php?id=15828
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:111
Jump to