TITLE: MySQL Multibyte Encoding SQL Injection Vulnerability
SECUNIA ADVISORY ID: SA20365
VERIFY ADVISORY: http://secunia.com/advisories/20365/
CRITICAL: Moderately critical
IMPACT: Manipulation of data
WHERE: >From remote
SOFTWARE:
MySQL 5.x
http://secunia.com/product/8355/
MySQL 4.x
http://secunia.com/product/404/
DESCRIPTION: A vulnerability has been reported in MySQL, which potentially can be exploited by malicious people to conduct SQL injection attacks. The vulnerability is caused due to an error within the server when parsing a query string that is escaped with the "mysql_real_escape_string()" function. This can potentially be exploited in an environment that uses multi-byte character encoding to bypass SQL injection escaping. The vulnerability is related to: SA20231. The vulnerability has been reported in version 4.1.19 and 5.0.21. Prior versions may also be affected.
SOLUTION: Update to the fixed versions.
MySQL 4.1.x: Update to version 4.1.20.
http://dev.mysql.com/downloads/mysql/4.1.html
MySQL 5.0.x: Update to version 5.0.22.
http://dev.mysql.com/downloads/mysql/5.0.html
MySQL 5.1.x: The vulnerability will be fixed in version 5.1.11. Read More...
MySQL Multibyte Encoding SQL Injection Vulnerability
Posted on Friday, June 02, 2006 @ 12:21:24 CDT in Security
|
Firefox Multiple Vulnerabilities - Highly Critical!
Posted on Friday, June 02, 2006 @ 09:13:49 CDT in Security
|
Thunderbird Multiple Vulnerabilities - Highly Critical
Posted on Friday, June 02, 2006 @ 09:03:58 CDT in Security
|
phpBB Blend Portal System Module
Posted on Wednesday, May 31, 2006 @ 07:27:52 CDT in Security
|
phpBB Activity Mod Plus Module phpbb_root_path File Inclusion
Posted on Wednesday, May 31, 2006 @ 07:24:11 CDT in Security
|
PHP curl_init() Safe Mode Bypass Weakness
Posted on Wednesday, May 31, 2006 @ 07:17:38 CDT in Security
|