CVE-2006-1516

N/A Unknown
Published: May 05, 2006 Modified: April 16, 2026
View on NVD

Description

The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://bugs.debian.org/365938
Source: security@debian.org
http://secunia.com/advisories/19929
Source: security@debian.org
Patch Vendor Advisory
http://secunia.com/advisories/20002
Source: security@debian.org
http://secunia.com/advisories/20073
Source: security@debian.org
http://secunia.com/advisories/20076
Source: security@debian.org
http://secunia.com/advisories/20223
Source: security@debian.org
http://secunia.com/advisories/20241
Source: security@debian.org
http://secunia.com/advisories/20253
Source: security@debian.org
http://secunia.com/advisories/20333
Source: security@debian.org
http://secunia.com/advisories/20424
Source: security@debian.org
http://secunia.com/advisories/20457
Source: security@debian.org
http://secunia.com/advisories/20625
Source: security@debian.org
http://secunia.com/advisories/20762
Source: security@debian.org
http://secunia.com/advisories/24479
Source: security@debian.org
http://secunia.com/advisories/29847
Source: security@debian.org
http://securitytracker.com/id?1016017
Source: security@debian.org
Patch
http://www.securityfocus.com/bid/17780
Source: security@debian.org
http://www.trustix.org/errata/2006/0028
Source: security@debian.org
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Source: security@debian.org
US Government Resource
http://www.wisec.it/vulns.php?page=7
Source: security@debian.org
Patch
https://usn.ubuntu.com/283-1/
Source: security@debian.org
http://bugs.debian.org/365938
Source: af854a3a-2127-422b-91ae-364da2661108
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://docs.info.apple.com/article.html?artnum=305214
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19929
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/20002
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20073
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20076
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20223
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20241
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20253
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20333
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20424
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20457
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20625
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20762
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/24479
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29847
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/840
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016017
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1071
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1073
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1079
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:084
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2006-06-02.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0544.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/432733/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/434164/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/17780
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.trustix.org/errata/2006/0028
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2006/1633
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/0930
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1326/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.wisec.it/vulns.php?page=7
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26236
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/283-1/
Source: af854a3a-2127-422b-91ae-364da2661108

84 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
82.3%
99th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

mysql oracle