TITLE: MySQL Multibyte Encoding SQL Injection Vulnerability
SECUNIA ADVISORY ID: SA20365
VERIFY ADVISORY: http://secunia.com/advisories/20365/
CRITICAL: Moderately critical
IMPACT: Manipulation of data
WHERE: >From remote
SOFTWARE:
MySQL 5.x
http://secunia.com/product/8355/
MySQL 4.x
http://secunia.com/product/404/
DESCRIPTION: A vulnerability has been reported in MySQL, which potentially can be exploited by malicious people to conduct SQL injection attacks. The vulnerability is caused due to an error within the server when parsing a query string that is escaped with the "mysql_real_escape_string()" function. This can potentially be exploited in an environment that uses multi-byte character encoding to bypass SQL injection escaping. The vulnerability is related to: SA20231. The vulnerability has been reported in version 4.1.19 and 5.0.21. Prior versions may also be affected.
SOLUTION: Update to the fixed versions.
MySQL 4.1.x: Update to version 4.1.20.
http://dev.mysql.com/downloads/mysql/4.1.html
MySQL 5.0.x: Update to version 5.0.22.
http://dev.mysql.com/downloads/mysql/5.0.html
MySQL 5.1.x: The vulnerability will be fixed in version 5.1.11.
PROVIDED AND/OR DISCOVERED BY: The vendor credits Josh Berkus and Tom Lane.
ORIGINAL ADVISORY:
MySQL:
http://dev.mysql.com/doc/refman/4.1/en/news-4-1-20.html
http://dev.mysql.com/doc/connector/j/en/news-5-0-22.html
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-11.html
http://lists.mysql.com/announce/364
http://lists.mysql.com/announce/365
http://bugs.mysql.com/bug.php?id=8378
OTHER REFERENCES: SA20231: http://secunia.com/advisories/20231/
MySQL Multibyte Encoding SQL Injection VulnerabilityPosted on Friday, June 02, 2006 @ 12:21:24 CDT in Security |