Vulnerability Description
The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mysql | Mysql | 4.1.0 |
References
- http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.htmlPatchVendor Advisory
- http://marc.info/?l=bugtraq&m=108904917528205&w=2
- http://www.kb.cert.org/vuls/id/184030PatchThird Party AdvisoryUS Government Resource
- http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.htmlPatchVendor Advisory
- http://marc.info/?l=bugtraq&m=108904917528205&w=2
- http://www.kb.cert.org/vuls/id/184030PatchThird Party AdvisoryUS Government Resource
FAQ
What is CVE-2004-0627?
CVE-2004-0627 is a vulnerability with a CVSS score of 10.0 (HIGH). The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string.
How severe is CVE-2004-0627?
CVE-2004-0627 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0627?
Check the references section above for vendor advisories and patch information. Affected products include: Mysql Mysql.