First published: Wed Dec 05 2012(Updated: )
A vulnerability was found in the handling of password salt values in MySQL. When a user logs into MySQL a salt value is generated that is then used to prevent password guessing attacks (since the salt value must be known in order to send a password). This salt value is created at the start of a session and used for the entire session, once authenticated an attacker can use the MySQL "change_user" command to attempt to login as a different, as the salt value is known a password guessing attack will be much more efficient. Reference: <a href="http://seclists.org/fulldisclosure/2012/Dec/58">http://seclists.org/fulldisclosure/2012/Dec/58</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle MySQL | >=5.5.0<5.5.29 | |
Mariadb Mariadb | >=5.2.0<5.2.14 | |
Mariadb Mariadb | >=5.3.0<5.3.12 | |
Mariadb Mariadb | >=5.5.0<5.5.29 | |
Mariadb Mariadb | =10.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.