First published: Sun Aug 29 2010(Updated: )
A denial of service flaw was found in the way MySQL processed EXPLAIN statements for SQL queries of the form: SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...) A remote authenticated MySQL user could use this flaw to cause mysqld deamon crash (dereference NULL pointer). References: [1] <a href="http://secunia.com/advisories/41048/">http://secunia.com/advisories/41048/</a> [2] <a href="http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html">http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html</a> Upstream bug report: [3] <a href="http://bugs.mysql.com/bug.php?id=52711">http://bugs.mysql.com/bug.php?id=52711</a> Upstream changesets: [4] <a href="http://lists.mysql.com/commits/105750">http://lists.mysql.com/commits/105750</a> [5] <a href="http://lists.mysql.com/commits/112043">http://lists.mysql.com/commits/112043</a> Note: This issue only causes a temporary denial of service, as the mysql daemon shipped with Red Hat Enterprise Linux 5 will be automatically restarted after the crash.
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL (MySQL-common) | <5.1.49 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-628328 is critical due to its potential to cause a denial of service by crashing the MySQL daemon.
To fix REDHAT-BUG-628328, upgrade MySQL to version 5.1.49 or later.
REDHAT-BUG-628328 affects MySQL versions prior to 5.1.49.
The vulnerability in REDHAT-BUG-628328 lies in the handling of EXPLAIN statements for certain SQL queries that utilize UNION and ORDER BY constructs.
A remote authenticated MySQL user could exploit REDHAT-BUG-628328 to trigger the denial of service.