Vulnerability Details : CVE-2009-2446
Potential exploit
Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request. NOTE: some of these details are obtained from third party information.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2009-2446
- cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.51a:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.22:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.23:*:*:*:*:*:*:*
Threat overview for CVE-2009-2446
Top countries where our scanners detected CVE-2009-2446
Top open port discovered on systems with this issue
3306
IPs affected by CVE-2009-2446 16,938
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2009-2446!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2009-2446
17.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-2446
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.5
|
HIGH | AV:N/AC:M/Au:S/C:C/I:C/A:C |
6.8
|
10.0
|
NIST |
CWE ids for CVE-2009-2446
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-2446
-
Red Hat 2010-02-17Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2446 This issue was addressed for Red hat Enterprise Linux 5 by https://rhn.redhat.com/errata/RHSA-2009-1289.html and Red Hat Enterprise Linux 4 by https://rhn.redhat.com/errata/RHSA-2010-0110.html . The Red Hat Security Response Team has rated this issue as having low security impact, future MySQL package updates may address this flaw for Red Hat Enterprise Linux 3 and Red Hat Application Stack 2.
References for CVE-2009-2446
-
http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html
Exploit
-
http://www.mandriva.com/security/advisories?name=MDVSA-2009:179
-
http://www.redhat.com/support/errata/RHSA-2010-0110.html
-
http://ubuntu.com/usn/usn-897-1
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857
-
http://www.securityfocus.com/archive/1/504799/100/0/threaded
-
http://support.apple.com/kb/HT4077
About the security content of Security Update 2010-002 / Mac OS X v10.6.3 - Apple Support
-
http://www.ubuntu.com/usn/USN-1397-1
USN-1397-1: MySQL vulnerabilities | Ubuntu security notices
-
http://www.securityfocus.com/bid/35609
Exploit
-
http://securitytracker.com/id?1022533
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/51614
-
http://www.redhat.com/support/errata/RHSA-2009-1289.html
-
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Apple - Lists.apple.com
-
http://www.vupen.com/english/advisories/2009/1857
Jump to