MySQL is prone to a remotely exploitable stack-based buffer overflow vulnerability. This issue exists in the password checking routines and may be triggered by a malicious authentication packet. Exploitation will be complicated by the fact that the exploit string will be scrambled with a random number generator and may also require a valid password hash. However, if successfully exploited, the attacker may execute arbitrary code in the context of the server. This issue is known to exist in MySQL 4.1 releases prior to 4.1.3 and MySQL 5.0.
MySQL is prone to a remotely exploitable stack-based buffer overflow vulnerability. This issue exists in the password checking routines and may be triggered by a malicious authentication packet. Exploitation will be complicated by the fact that the exploit string will be scrambled with a random number generator and may also require a valid password hash. However, if successfully exploited, the attacker may execute arbitrary code in the context of the server. This issue is known to exist in MySQL 4.1 releases prior to 4.1.3 and MySQL 5.0.