First published: Fri Oct 11 2002(Updated: )
Buffer overflow in MySQL daemon (mysqld) before 3.23.50, and 4.0 beta before 4.02, on the Win32 platform, allows local users to execute arbitrary code via a long "datadir" parameter in the my.ini initialization file, whose permissions on Windows allow Full Control to the Everyone group.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle MySQL | =3.23.49 | |
Oracle MySQL | =4.0.0 | |
Oracle MySQL | =4.0.1 | |
MySQL | =3.23.49 | |
MySQL | =4.0.0 | |
MySQL | =4.0.1 | |
All of | ||
Any of | ||
MySQL | <3.23.50 | |
MySQL | >=4.0.0<=4.0.2 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0969 is categorized as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2002-0969, upgrade MySQL to version 3.23.50 or later, or to version 4.0.2 or later.
CVE-2002-0969 affects MySQL daemon versions prior to 3.23.50 and 4.0 beta versions before 4.0.2 running on Windows.
The vulnerability in CVE-2002-0969 is caused by a buffer overflow in the MySQL daemon due to a long 'datadir' parameter.
Yes, CVE-2002-0969 can allow local users to execute arbitrary code, leading to significant security breaches.