MySQL Short Check String Authentication Bypass

high Nessus Plugin ID 10343

Synopsis

The remote MySQL server is vulnerable to an access control breach.

Description

The remote version of MySQL is older than (or as old as) version 3.22.30 or 3.23.10. Thus, it may allow attacker who knows a valid username to access database tables without a valid password.

Solution

Upgrade to a newer version, or edit the file mysql-xxx/sql/password.c, and search for the 'while(*scrambled)' loop. In front of it, add :

'if(strlen(scrambled) != strlen(to))return 1'

See Also

https://seclists.org/bugtraq/2000/Feb/134

Plugin Details

Severity: High

ID: 10343

File Name: mysql_bad_password.nasl

Version: 1.31

Type: remote

Family: Databases

Published: 3/8/2000

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.1

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:mysql:mysql

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2/8/2000

Reference Information

CVE: CVE-2000-0148

BID: 975