Skip to main content

MySQL Vulnerability Allows Attackers to Bypass Password Verification

Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.
The vulnerability is identified as CVE-2012-2122 and was addressed in MySQL 5.1.63 and 5.5.25 in May. However, many server administrators might not be aware of its impact, because the changelog for those versions contained very little information about the security bug.
The vulnerability can only be exploited if MySQL was built on a system where the memcmp() function can return values outside the -128 to 127 range. This is the case for Linux systems that use an SSE-optimized glibc (GNU C library).
If MySQL was built on such a system, the code that compares the cryptographic hash of a user-inputted password to the hash stored in the database for a particular account will sometimes allow authentication even if the supplied password is incorrect.
The probability of triggering this bug successfully on systems that meet the prerequisite is about 1 in 256, said Sergei Golubchik, the security coordinator for MariaDB, in an email sent to the oss-sec mailing list on Saturday. "~300 attempts takes only a fraction of second, so basically account password protection is as good as nonexistent."
MariaDB is a community-developed branch of MySQL that was also affected by this vulnerability. The flaw was patched in MariaDB versions 5.1.62, 5.2.12, 5.3.6 and 5.5.23 back in April.
A module for exploiting this vulnerability was added to the popular Metasploit penetration testing framework on Sunday. After exploiting the vulnerability, the module copies the MySQL server's master user table, which contains all password hashes.

Read More

Comments

Popular posts from this blog

Spike - Tango versuri

vad stele verzi, cum tu nu le vezi? Acolo intre farfuria zburatoare si omuletii verzi N-am luat-o razna, de ce nu ma crezi? Uite-mi face semn cu mana, frate tre sa ma salvezi Spike pari dubios, vrei sa-ncetezi? Se uita lumea ciudat la tine, incearca sa dansezi Cum poti sa te distrezi? Da-i afara Mortii lor, zi-le sa plece, fa-i sa dispara Hei buna, nici nu te-am vazut pe-aici Ce faci? Tu bine, eu Nu conteaza cum te cheama ca-mi placi Discutia asta-i putin cam trasa de par N-am papagal sa te conving, Dar iti dau un hamster. Ce-ai fata, pari speriata Tu vrei sa ne distram impreuna E-o seara minunata Esti putin ametita dar nu se vede ca esti beata Si la cum esti imbracata, Sincer, te-as f**e-odata Da-mi mana , hai pe ring Pot sa te-mping Te-ai incins, te sting Nu mai ai glas? Arata-mi ce stii, ce poti tu Esti praf Asta ce inseamna, ca pot sa te trag pe nas ? Zi-mi de unde vi, unde vrei sa ajungi Unde vrei sa fugi, ca scapare n-ai Unde vrei sa pleci, n-ai p...

Feedly launches 'Feedly Cloud' sync platform, new web interface

Feedly, one of the leading Google Reader replacement services, announced major restructuring of its services today with a new cloud infrastructure and web interface. Posted on its official blog, Feedly unveiled what it calls "Feedly Cloud", a scalable infrastructure it says is ready to replace Google Reader. The new Feedly Cloud provides several benefits, the first of which is one-click import from Google Reader -- new users to the service can now simply pull everything over seamlessly from their Google account and start using Feedly right away. Existing users will simply have to make sure that they have the latest version of Feedly installed, and their accounts will be migrated to Feedly Cloud over the next few days. Additionally, the new service allowed Feedly to create a stand-alone web interface (found simply at cloud.feedly.com) that works in all major browsers without plugins or extensions. The transition to Feedly Cloud has another benefit, and that is the abilit...

CentOS 6 making its way out to mirrors

According to  http://qaweb.dev.centos.org/qa/node/63  CentOS 6 is being released to the www sync started few hours ago