Vulnerability Description
Buffer overflow in the prepared statements API in libmysqlclient for MySQL 4.1.3 beta and 4.1.4 allows remote attackers to cause a denial of service via a large number of placeholders.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oracle | Mysql | 4.1.3 |
References
- http://bugs.mysql.com/bug.php?id=5194ExploitVendor Advisory
- http://dev.mysql.com/doc/mysql/en/news-4-1-5.html
- http://securitytracker.com/id?1011408Patch
- http://www.osvdb.org/10244
- http://www.securityfocus.com/bid/11261Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17493
- http://bugs.mysql.com/bug.php?id=5194ExploitVendor Advisory
- http://dev.mysql.com/doc/mysql/en/news-4-1-5.html
- http://securitytracker.com/id?1011408Patch
- http://www.osvdb.org/10244
- http://www.securityfocus.com/bid/11261Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17493
FAQ
What is CVE-2004-2149?
CVE-2004-2149 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Buffer overflow in the prepared statements API in libmysqlclient for MySQL 4.1.3 beta and 4.1.4 allows remote attackers to cause a denial of service via a large number of placeholders.
How severe is CVE-2004-2149?
CVE-2004-2149 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-2149?
Check the references section above for vendor advisories and patch information. Affected products include: Oracle Mysql.