First published: Mon Aug 30 2010(Updated: )
A denial of service flaw was found in the way MySQL processed alternate read requests from two indexes on a table using the HANDLER interface. A remote, authenticated MySQL user could use this flaw to cause mysqld daemon abort. References: [1] <a href="http://secunia.com/advisories/41048/">http://secunia.com/advisories/41048/</a> [2] <a href="http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html">http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html</a> Upstream bug report: [3] <a href="http://bugs.mysql.com/bug.php?id=54007">http://bugs.mysql.com/bug.php?id=54007</a> Upstream commit: [4] <a href="http://lists.mysql.com/commits/110598">http://lists.mysql.com/commits/110598</a>
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL (MySQL-common) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-628680 is categorized as a denial of service flaw that can lead to mysqld daemon aborting.
To fix REDHAT-BUG-628680, it is recommended to upgrade to the latest patched version of MySQL.
REDHAT-BUG-628680 affects MySQL versions that utilize the HANDLER interface when processing alternate read requests.
A remote, authenticated MySQL user can exploit REDHAT-BUG-628680 to cause the MySQL daemon to abort.
REDHAT-BUG-628680 represents a denial of service attack, affecting the stability of the MySQL server.