MySQL Server date_format()拒绝服务漏洞

2008-04-09 04:18:49来源:互联网 阅读 ()

新老客户大回馈,云服务器低至5折

MySQL Server date_format()拒绝服务漏洞

发布日期:2006-07-18
更新日期:2006-07-19

受影响系统:
Debian Linux 3.1
MySQL AB MySQL < 5.1.6
MySQL AB MySQL < 5.0.19
MySQL AB MySQL < 4.1.18
不受影响系统:
MySQL AB MySQL 5.1.6
MySQL AB MySQL 5.0.19
MySQL AB MySQL 4.1.18
描述:
BUGTRAQ ID: 19032
CVE(CAN) ID: CVE-2006-3469

MySQL是一款使用非常广泛的开放源代码关系数据库系统,拥有各种平台的运行版本。

MySQL服务器的date_format()函数在处理用户提交的参数时存在漏洞,畸形的参数数据会导致MySQL服务器崩溃。

如果用户用特别的SQL语句调用了MySQL的date_format()函数的话,就可能导致服务器崩溃。

<*来源:Christian Hammers

链接:http://bugs.mysql.com/bug.php?id=20729
http://www.debian.org/security/2005/dsa-1112
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

select date_format('%d%s', 1);

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1112-1)以及相应补丁:
DSA-1112-1:New mysql-dfsg-4.1 packages fix denial of service
链接:http://www.debian.org/security/2005/dsa-1112

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a-4sarge5.dsc
Size/MD5 checksum: 1021 9cd4f7df9345856d06846e0ddb50b9ee
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a-4sarge5.diff.gz
Size/MD5 checksum: 168442 e45db0b01b3adaf09500d54090f3a1e1
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a.orig.tar.gz
Size/MD5 checksum: 15771855 3c0582606a8903e758c2014c2481c7c3

Architecture independent components:

http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.11a-4sarge5_all.deb
Size/MD5 checksum: 36520 e8115191126dc0b373a53024e5c78733

Alpha architecture:

http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge5_alpha.deb
Size/MD5 checksum: 1590788 297b4444903885a19c76a1217e83477d
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge5_alpha.deb
Size/MD5 checksum: 7965184 8df4e20d157517541228fa52e4c60dbc
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge5_alpha.deb
Size/MD5 checksum: 1000952 4d62bca949f80c09f043a78b9e701ca5
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge5_alpha.deb
Size/MD5 checksum: 17487070 b357fcab1b57764e1ee8a341dd30def3

AMD64 architecture:

http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge5_amd64.deb
Size/MD5 checksum: 1452034 a22b66b8e00b2409bf1428834af1073b
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge5_amd64.deb
Size/MD5 checksum: 5551704 731f50735026de2b95d9e9d9e19a7717
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge5_amd64.deb
Size/MD5 checksum: 849526 a0a5d944db8261044bcdddbe55ab03d6
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge5_amd64.deb
Size/MD5 checksum: 14711282 bf471f8b19fe0aa14bf04209c0eac975

ARM architecture:

http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge5_arm.deb
Size/MD5 checksum: 1388864 1ed00eac905063c7caa7702bb6a4dcda
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge5_arm.deb
Size/MD5 checksum: 5558854 46fac3302d6e4677bb1dbce5f5aa1387
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge5_arm.deb
Size/MD5 checksum: 836766 5487191a4af54786066ac720456b5b68
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge5_arm.deb
Size/MD5 checksum: 14557630 1369e1f83fad8dfcbea1618e0acd821e

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge5_i386.deb
Size/MD5 checksum: 1418036 ab5768abe67a1d21c714a078f2ec86f0
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge5_i386.deb
Size/MD5 checksum: 5643732 bf891e68e488947fd28a940a367d722f
http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge5_i386.deb

标签:

版权申明:本站文章部分自网络,如有侵权,请联系:west999com@outlook.com
特别注意:本站所有转载文章言论不代表本站观点,本站所提供的摄影照片,插画,设计作品,如需使用,请与原作者联系,版权归原作者所有

上一篇:Linux Kernel USB驱动数据队列本地拒绝服务漏洞

下一篇:Invision Power Board ipsclass.php脚本远程SQL注入漏洞