First published: Mon Aug 30 2010(Updated: )
MySQL improperly handled LOAD DATA INFILE requests (it did not check for SQL errors and sent an OK packet even when errors were already reported). A remote, authenticated MySQL user could use this flaw to cause mysqld daemon abort (assertion failure). References: [1] <a href="http://secunia.com/advisories/41048/">http://secunia.com/advisories/41048/</a> [2] <a href="http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html">http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html</a> Upstream bug report: [3] <a href="http://bugs.mysql.com/bug.php?id=52512">http://bugs.mysql.com/bug.php?id=52512</a> Upstream changeset: [4] <a href="http://lists.mysql.com/commits/105163">http://lists.mysql.com/commits/105163</a>
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL (MySQL-common) | <=5.1.49 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-628698 is critical due to the potential for remote authenticated users to exploit the flaw and cause the mysqld daemon to abort.
To fix REDHAT-BUG-628698, upgrade MySQL to version 5.1.50 or later, which includes patches for this vulnerability.
REDHAT-BUG-628698 affects MySQL versions up to and including 5.1.49.
The impact of REDHAT-BUG-628698 can lead to assertion failures and abrupt termination of the mysqld daemon during particular LOAD DATA INFILE requests.
No, a remote user must be authenticated in order to exploit the vulnerability described in REDHAT-BUG-628698.