Vulnerability Details : CVE-2006-3469
Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2006-3469
Probability of exploitation activity in the next 30 days: 93.18%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-3469
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
[email protected] |
CWE ids for CVE-2006-3469
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: [email protected] (Primary)
Vendor statements for CVE-2006-3469
-
Red Hat 2008-07-25This issue was addressed in mysql packages as shipped in Red Hat Enterprise Linux 4 via: https://rhn.redhat.com/errata/RHSA-2008-0768.html This issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1, 3, or 5, and Red Hat Application Stack v1 and v2.
-
http://security.gentoo.org/glsa/glsa-200608-09.xml
- http://docs.info.apple.com/article.html?artnum=305214
-
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
US Government Resource
-
http://www.debian.org/security/2006/dsa-1112
Patch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827
- http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html
-
http://www.securityfocus.com/bid/19032
-
http://bugs.mysql.com/bug.php?id=20729
-
http://www.vupen.com/english/advisories/2007/0930
Vendor Advisory
- http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
- http://www.redhat.com/support/errata/RHSA-2008-0768.html
-
http://www.ubuntu.com/usn/usn-321-1
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694
- cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*