National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2012-5612 Detail

Current Description

Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.

Source:  MITRE      Last Modified:  12/03/2012      View Analysis Description

Evaluator Description

Per http://www.openwall.com/lists/oss-security/2012/12/02/3, this vulnerability is for linux-based software installations.

Quick Info

CVE Dictionary Entry:
CVE-2012-5612
Original release date:
12/03/2012
Last revised:
09/18/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
6.5 MEDIUM
Vector:
(AV:N/AC:L/Au:S/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
8.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html External Source SUSE SUSE-SU-2013:0262
http://seclists.org/fulldisclosure/2012/Dec/5 Exploit External Source FULLDISC 20121201 MySQL (Linux) Heap Based Overrun PoC Zeroday
http://security.gentoo.org/glsa/glsa-201308-06.xml External Source GENTOO GLSA-201308-06
http://www.exploit-db.com/exploits/23076 Exploit External Source EXPLOIT-DB 23076
http://www.mandriva.com/security/advisories?name=MDVSA-2013:102 External Source MANDRIVA MDVSA-2013:102
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 External Source MANDRIVA MDVSA-2013:150
http://www.openwall.com/lists/oss-security/2012/12/02/3 External Source MLIST [oss-security] 20121202 Re: Re: [Full-disclosure] MySQL (Linux) Stack based buffer overrun PoC Zeroday
http://www.openwall.com/lists/oss-security/2012/12/02/4 External Source MLIST [oss-security] 20121202 Re: Re: [Full-disclosure] MySQL (Linux) Stack based buffer overrun PoC Zeroday
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html External Source CONFIRM http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
http://www.ubuntu.com/usn/USN-1703-1 External Source UBUNTU USN-1703-1
https://mariadb.atlassian.net/browse/MDEV-3908 Exploit; Patch External Source CONFIRM https://mariadb.atlassian.net/browse/MDEV-3908
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16960 External Source OVAL oval:org.mitre.oval:def:16960

Technical Details

Vulnerability Type (View All)

Change History 2 change records found - show changes