Executive Summary

Informations
Name CVE-2005-2558 First vendor Publication 2005-08-16
Vendor Cve Last vendor Modification 2019-12-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 4.6 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2558

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 38

OpenVAS Exploits

Date Description
2009-10-10 Name : SLES9: Security update for MySQL
File : nvt/sles9p5021168.nasl
2008-01-17 Name : Debian Security Advisory DSA 829-1 (mysql)
File : nvt/deb_829_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 831-1 (mysql-dfsg)
File : nvt/deb_831_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 833-1 (mysql-dfsg-4.1)
File : nvt/deb_833_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 833-2 (mysql-dfsg-4.1)
File : nvt/deb_833_2.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
18896 MySQL User-Defined Function init_syms() Function Overflow

Snort® IPS/IDS

Date Description
2014-01-10 create function buffer overflow attempt
RuleID : 4649 - Revision : 7 - Type : SERVER-MYSQL

Nessus® Vulnerability Scanner

Date Description
2006-01-21 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-180-2.nasl - Type : ACT_GATHER_INFO
2006-01-15 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-180-1.nasl - Type : ACT_GATHER_INFO
2005-10-05 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-829.nasl - Type : ACT_GATHER_INFO
2005-10-05 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-831.nasl - Type : ACT_GATHER_INFO
2005-10-05 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-833.nasl - Type : ACT_GATHER_INFO
2005-10-05 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2005-163.nasl - Type : ACT_GATHER_INFO
2005-08-10 Name : The remote database server is affected by multiple vulnerabilities.
File : mysql_init_syms_buffer_overflow.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/14509
BUGTRAQ http://marc.info/?l=bugtraq&m=112354450412427&w=2
DEBIAN http://www.debian.org/security/2005/dsa-829
http://www.debian.org/security/2005/dsa-831
http://www.debian.org/security/2005/dsa-833
FEDORA http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html
FULLDISC http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html
MANDRIVA http://www.mandriva.com/security/advisories?name=MDKSA-2005:163
MISC http://www.appsecinc.com/resources/alerts/mysql/2005-002.html
SCO ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt
SECUNIA http://secunia.com/advisories/17027
http://secunia.com/advisories/20381
http://secunia.com/advisories/29847
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
SUSE http://www.novell.com/linux/security/advisories/2005_21_sr.html
UBUNTU https://www.ubuntu.com/usn/usn-180-1/
https://www.ubuntu.com/usn/usn-180-2/
VUPEN http://www.vupen.com/english/advisories/2008/1326/references
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/21737

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Date Informations
2024-02-02 01:03:12
  • Multiple Updates
2024-02-01 12:01:44
  • Multiple Updates
2023-09-05 12:03:01
  • Multiple Updates
2023-09-05 01:01:35
  • Multiple Updates
2023-09-02 12:03:02
  • Multiple Updates
2023-09-02 01:01:35
  • Multiple Updates
2023-08-12 12:03:36
  • Multiple Updates
2023-08-12 01:01:36
  • Multiple Updates
2023-08-11 12:03:09
  • Multiple Updates
2023-08-11 01:01:38
  • Multiple Updates
2023-08-06 12:02:56
  • Multiple Updates
2023-08-06 01:01:36
  • Multiple Updates
2023-08-04 12:03:00
  • Multiple Updates
2023-08-04 01:01:37
  • Multiple Updates
2023-07-14 12:02:59
  • Multiple Updates
2023-07-14 01:01:37
  • Multiple Updates
2023-03-29 01:03:06
  • Multiple Updates
2023-03-28 12:01:42
  • Multiple Updates
2022-10-11 12:02:40
  • Multiple Updates
2022-10-11 01:01:29
  • Multiple Updates
2021-05-04 12:03:06
  • Multiple Updates
2021-04-22 01:03:23
  • Multiple Updates
2020-05-23 00:16:45
  • Multiple Updates
2019-10-08 17:19:37
  • Multiple Updates
2017-07-11 12:01:58
  • Multiple Updates
2016-12-08 09:23:21
  • Multiple Updates
2016-10-18 12:01:45
  • Multiple Updates
2016-04-26 13:43:48
  • Multiple Updates
2014-02-17 10:32:26
  • Multiple Updates
2014-01-19 21:22:51
  • Multiple Updates
2013-05-11 11:30:14
  • Multiple Updates