Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-3486 | First vendor Publication | 2006-07-10 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 2.1 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called. NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon. Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3486 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
28288 | MySQL Instance_options::complete_initialization Function Overflow A local overflow has been reported in MySQL. The Instance Manager fails to properly sanitize input to the Instance_options::complete_initialization function resulting in an off-by-one overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code. MySQL developers have stated that this is "only exploitable when the user has access to the configuration file or the Instance Manager daemon. Due to intended functionality, this level of access would already allow the user to disrupt program operation", so this does not cross security boundaries and is not a vulnerability. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-01-18 | Name : The remote database server is vulnerable to a denial of service attack. File : mysql_5_0_23_or_5_1_12.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:20:02 |
|
2024-11-28 12:09:26 |
|
2024-08-08 00:28:41 |
|
2024-08-02 12:04:51 |
|
2024-08-02 01:01:58 |
|
2024-05-17 09:28:44 |
|
2024-05-14 21:28:31 |
|
2024-04-11 09:28:47 |
|
2024-03-21 09:28:50 |
|
2024-02-02 01:04:33 |
|
2024-02-01 12:01:58 |
|
2023-11-07 21:48:03 |
|
2023-09-05 12:04:15 |
|
2023-09-05 01:01:50 |
|
2023-09-02 12:04:18 |
|
2023-09-02 01:01:50 |
|
2023-08-12 12:05:06 |
|
2023-08-12 01:01:50 |
|
2023-08-11 12:04:23 |
|
2023-08-11 01:01:52 |
|
2023-08-06 12:04:09 |
|
2023-08-06 01:01:51 |
|
2023-08-04 12:04:14 |
|
2023-08-04 01:01:53 |
|
2023-07-14 12:04:13 |
|
2023-07-14 01:01:52 |
|
2023-03-29 01:04:30 |
|
2023-03-28 12:01:56 |
|
2022-10-11 12:03:44 |
|
2022-10-11 01:01:43 |
|
2021-05-04 12:04:17 |
|
2021-04-22 01:04:55 |
|
2020-05-23 00:18:04 |
|
2017-07-20 09:23:44 |
|
2014-02-17 10:36:24 |
|
2013-05-11 11:02:55 |
|