ðòïåëôù
áòèé÷
Security-alerts @yandex-team.ru
óôáôøé
ðåòóïîáìøîïå
ðòïçòáííù
ðéûéôåðéóøíá
> TITLE: > MySQL Multibyte Encoding SQL Injection Vulnerability > > SECUNIA ADVISORY ID: > SA20365 > > VERIFY ADVISORY: > http://secunia.com/advisories/20365/ > > CRITICAL: > Moderately critical > > IMPACT: > Manipulation of data > > WHERE: > From remote > > SOFTWARE: > MySQL 5.x > http://secunia.com/product/8355/ > MySQL 4.x > http://secunia.com/product/404/ > > DESCRIPTION: > A vulnerability has been reported in MySQL, which potentially can be > exploited by malicious people to conduct SQL injection attacks. > > The vulnerability is caused due to an error within the server when > parsing a query string that is escaped with the > "mysql_real_escape_string()" function. This can potentially be > exploited in an environment that uses multi-byte character encoding > to bypass SQL injection escaping. > > The vulnerability is related to: > SA20231 > > The vulnerability has been reported in version 4.1.19 and 5.0.21. > Prior versions may also be affected. > > SOLUTION: > Update to the fixed versions. > > MySQL 4.1.x: > Update to version 4.1.20. > http://dev.mysql.com/downloads/mysql/4.1.html > > MySQL 5.0.x: > Update to version 5.0.22. > http://dev.mysql.com/downloads/mysql/5.0.html > > MySQL 5.1.x: > The vulnerability will be fixed in version 5.1.11. > > PROVIDED AND/OR DISCOVERED BY: > The vendor credits Josh Berkus and Tom Lane. > > ORIGINAL ADVISORY: > MySQL: > http://dev.mysql.com/doc/refman/4.1/en/news-4-1-20.html > http://dev.mysql.com/doc/connector/j/en/news-5-0-22.html > http://dev.mysql.com/doc/refman/5.1/en/news-5-1-11.html > http://lists.mysql.com/announce/364 > http://lists.mysql.com/announce/365 > http://bugs.mysql.com/bug.php?id=8378 > > OTHER REFERENCES: > SA20231: > http://secunia.com/advisories/20231/ >
Copyright © Lexa Software, 1996-2009.