First published: Thu Oct 07 2010(Updated: )
A flaw in MySQL versions prior to 5.1.51 [1] was reported [2] that could allow an authenticated user to cause the MySQL server to crash when improper WKB data was passed to the PolyFromWKB() function. There is an upstream patch [3] to correct the issue. [1] <a href="http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html">http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html</a> [2] <a href="http://bugs.mysql.com/bug.php?id=51875">http://bugs.mysql.com/bug.php?id=51875</a> [3] <a href="http://lists.mysql.com/commits/117094">http://lists.mysql.com/commits/117094</a>
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL (MySQL-common) | <5.1.51 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-640865 is classified as a significant issue because it allows authenticated users to crash the MySQL server.
To resolve the vulnerability REDHAT-BUG-640865, you should upgrade MySQL to version 5.1.51 or higher.
MySQL versions prior to 5.1.51 are affected by REDHAT-BUG-640865.
No, REDHAT-BUG-640865 requires authenticated user access to exploit the vulnerability.
The vulnerability in REDHAT-BUG-640865 is related to the PolyFromWKB() function in MySQL.