First published: Mon Apr 25 2005(Updated: )
Multiple buffer overflows in the web tool for MySQL MaxDB before 7.5.00.26 allows remote attackers to execute arbitrary code via (1) an HTTP GET request with a long file parameter after a percent ("%") sign or (2) a long Lock-Token string to the WebDAV functionality, which is not properly handled by the getLockTokenHeader function in WDVHandler_CommonUtils.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL MaxDB | =7.5.00 | |
MySQL MaxDB | =7.5.00.18 | |
MySQL MaxDB | =7.5.00.15 | |
MySQL MaxDB | =7.5.00.12 | |
MySQL MaxDB | =7.5.00.16 | |
MySQL MaxDB | =7.5.00.14 | |
MySQL MaxDB | =7.5.00.23 | |
MySQL MaxDB | =7.5.00.19 | |
MySQL MaxDB | =7.5.00.11 | |
MySQL MaxDB | =7.5.00.08 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2005-0684 is rated as critical due to potential arbitrary code execution.
To fix CVE-2005-0684, upgrade MySQL MaxDB to version 7.5.00.26 or later.
Versions 7.5.00 up to 7.5.00.25 of MySQL MaxDB are affected by CVE-2005-0684.
CVE-2005-0684 allows remote attackers to execute arbitrary code via crafted HTTP GET requests or long Lock-Token strings.
Yes, a patch is available through the update to MySQL MaxDB version 7.5.00.26 or later.