Skip to navigation

CVE Database

CVE-2009-2446

Impact: Low
Public: 2009-07-09
Bugzilla: 511020: CVE-2009-2446 MySQL: Format string vulnerability by manipulation with database instances (crash)

Details

The MITRE CVE dictionary describes this issue as:

Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request. NOTE: some of these details are obtained from third party information.

Find out more about CVE-2009-2446 from the MITRE CVE dictionary and NIST NVD.

Statement

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2446

This issue was addressed for Red hat Enterprise Linux 5 by https://rhn.redhat.com/errata/RHSA-2009-1289.html and Red Hat Enterprise Linux 4 by https://rhn.redhat.com/errata/RHSA-2010-0110.html .

The Red Hat Security Response Team has rated this issue as having low security impact, future MySQL package updates may address this flaw for Red Hat Enterprise Linux 3 and Red Hat Application Stack 2.

CVSS v2 metrics

Base Score: 3.5
Base Metrics: AV:N/AC:M/Au:S/C:N/I:N/A:P
Access Vector: Network
Access Complexity: Medium
Authentication: Single Instance
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Application Stack v2 for Enterprise Linux (v.5) RHSA-2009:1461 September 23, 2009
Red Hat Enterprise Linux version 4 (mysql) RHSA-2010:0110 February 16, 2010
Red Hat Enterprise Linux version 5 (mysql) RHSA-2009:1289 September 02, 2009

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.