Use-after-free vulnerability in the my_login function in DBD::mysql before 4.033_01 allows attackers to have unspecified impact by leveraging a call to mysql_errno after a failure of my_login.
References
Link | Resource |
---|---|
http://www.debian.org/security/2016/dsa-3635 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/07/25/13 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/07/27/1 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/92118 | |
https://blog.fuzzing-project.org/50-Use-after-free-in-my_login-function-of-DBDmysql-Perl-module.html | Third Party Advisory |
https://github.com/perl5-dbi/DBD-mysql/blob/4.033_01/Changes | Release Notes |
https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156 | Issue Tracking Patch |
https://github.com/perl5-dbi/DBD-mysql/pull/45 | Issue Tracking Patch |
https://security.gentoo.org/glsa/201701-51 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2016-08-19T21:00:00
Updated: 2017-06-30T16:57:01
Reserved: 2016-07-26T00:00:00
Link: CVE-2015-8949
JSON object: View
NVD Information
Status : Modified
Published: 2016-08-19T21:59:02.260
Modified: 2017-07-01T01:29:29.813
Link: CVE-2015-8949
JSON object: View
Redhat Information
No data.
CWE