First published: Wed Dec 05 2012(Updated: )
A vulnerability was found in the handling of password salt values in MySQL. When a user logs into MySQL a salt value is generated that is then used to prevent password guessing attacks (since the salt value must be known in order to send a password). This salt value is created at the start of a session and used for the entire session, once authenticated an attacker can use the MySQL "change_user" command to attempt to login as a different, as the salt value is known a password guessing attack will be much more efficient. Reference: <a href="http://seclists.org/fulldisclosure/2012/Dec/58">http://seclists.org/fulldisclosure/2012/Dec/58</a>
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-883719 is considered a serious vulnerability due to its impact on password security in MySQL.
To fix REDHAT-BUG-883719, ensure you are using the latest version of MySQL with the relevant security patches applied.
Users and administrators of MySQL Server are affected by REDHAT-BUG-883719 if they do not update their software.
The nature of the vulnerability in REDHAT-BUG-883719 relates to the improper handling of password salt values, which compromises password guessing defenses.
REDHAT-BUG-883719 was reported in December 2012.