Unknown
CVE-2012-5611 MySQL Buffer Overflow
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(1 user assessed)Unknown
(1 user assessed)Unknown
Unknown
Unknown
CVE-2012-5611 MySQL Buffer Overflow
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command.
Add Assessment
Technical Analysis
Details
Install
MySQL-client-community-5.1.66-1.rhel4.i386.rpm MySQL-shared-community-5.1.66-1.rhel4.i386.rpm
MySQL-server-community-5.1.66-1.rhel4.i386.rpm
Packages available here: http://downloads.skysql.com/archive/index/p/mysql/v/5.1.66
On a fresh CentOS install (minimal) mysql-libs are installed, it and its dependencies should be deleted with rpm -e (all at the same time).
Once installed add a user:
mysql> CREATE USER 'juan'@'%' IDENTIFIED BY 'mypass'; Query OK, 0 rows affected (0.00 sec)
And grant privileges:
mysql> GRANT ALL PRIVILEGES ON *.* TO 'juan'@'%'; Query OK, 0 rows affected (0.00 sec)
mysql> FLUSH PRIVILEGES; Query OK, 0 rows affected (0.00 sec)
Ready to test…
Start through mysqld_safe:
[root@localhost mysql]# /usr/bin/mysqld_safe --user=mysql 130712 07:23:38 mysqld_safe Logging to '/var/lib/mysql/localhost.localdomain.err'. 130712 07:23:38 mysqld_safe Starting mysqld daemon with databases from /var/lib/mysql
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- mariadb,
- oracle
Products
- mariadb 5.1.41,
- mariadb 5.1.42,
- mariadb 5.1.44,
- mariadb 5.1.47,
- mariadb 5.1.49,
- mariadb 5.1.50,
- mariadb 5.1.51,
- mariadb 5.1.53,
- mariadb 5.1.55,
- mariadb 5.1.60,
- mariadb 5.1.61,
- mariadb 5.1.62,
- mariadb 5.2.0,
- mariadb 5.2.1,
- mariadb 5.2.10,
- mariadb 5.2.11,
- mariadb 5.2.12,
- mariadb 5.2.2,
- mariadb 5.2.3,
- mariadb 5.2.4,
- mariadb 5.2.5,
- mariadb 5.2.6,
- mariadb 5.2.7,
- mariadb 5.2.8,
- mariadb 5.2.9,
- mariadb 5.3.0,
- mariadb 5.3.1,
- mariadb 5.3.10,
- mariadb 5.3.2,
- mariadb 5.3.3,
- mariadb 5.3.4,
- mariadb 5.3.5,
- mariadb 5.3.6,
- mariadb 5.3.7,
- mariadb 5.3.8,
- mariadb 5.3.9,
- mariadb 5.5.20,
- mariadb 5.5.21,
- mariadb 5.5.22,
- mariadb 5.5.23,
- mariadb 5.5.24,
- mariadb 5.5.25,
- mariadb 5.5.27,
- mariadb 5.5.28,
- mysql 5.1.53,
- mysql 5.5.19
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: