Skip to main content

MySQL Vulnerability Allows Attackers to Bypass Password Verification

Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.
The vulnerability is identified as CVE-2012-2122 and was addressed in MySQL 5.1.63 and 5.5.25 in May. However, many server administrators might not be aware of its impact, because the changelog for those versions contained very little information about the security bug.
The vulnerability can only be exploited if MySQL was built on a system where the memcmp() function can return values outside the -128 to 127 range. This is the case for Linux systems that use an SSE-optimized glibc (GNU C library).
If MySQL was built on such a system, the code that compares the cryptographic hash of a user-inputted password to the hash stored in the database for a particular account will sometimes allow authentication even if the supplied password is incorrect.
The probability of triggering this bug successfully on systems that meet the prerequisite is about 1 in 256, said Sergei Golubchik, the security coordinator for MariaDB, in an email sent to the oss-sec mailing list on Saturday. "~300 attempts takes only a fraction of second, so basically account password protection is as good as nonexistent."
MariaDB is a community-developed branch of MySQL that was also affected by this vulnerability. The flaw was patched in MariaDB versions 5.1.62, 5.2.12, 5.3.6 and 5.5.23 back in April.
A module for exploiting this vulnerability was added to the popular Metasploit penetration testing framework on Sunday. After exploiting the vulnerability, the module copies the MySQL server's master user table, which contains all password hashes.

Read More

Comments

Popular posts from this blog

Feedly launches 'Feedly Cloud' sync platform, new web interface

Feedly, one of the leading Google Reader replacement services, announced major restructuring of its services today with a new cloud infrastructure and web interface. Posted on its official blog, Feedly unveiled what it calls "Feedly Cloud", a scalable infrastructure it says is ready to replace Google Reader. The new Feedly Cloud provides several benefits, the first of which is one-click import from Google Reader -- new users to the service can now simply pull everything over seamlessly from their Google account and start using Feedly right away. Existing users will simply have to make sure that they have the latest version of Feedly installed, and their accounts will be migrated to Feedly Cloud over the next few days. Additionally, the new service allowed Feedly to create a stand-alone web interface (found simply at cloud.feedly.com) that works in all major browsers without plugins or extensions. The transition to Feedly Cloud has another benefit, and that is the abilit...

Google+ Rolls Out Restricted Communities for Corporate Users

Google this week rolled out a new Google+ security feature for organizations intended to help them keep certain conversations private from the larger Web. Much like Microsoft's Yammer, Google+ restricted communities will only allow access to approved employees. "Whether it's designs of your beta product or notes from your team off-site, anything you post will remain restricted to the organization," Google+ product manager Michael Cai wrote in a blog post. Community administrators can decide whether the site will remain open to everyone at the company, or kept private by invitation only. Google+ also allows for people outside of your domain — clients, agencies, business partners — to join the conversation.