#VU33687 Stack-based buffer overflow - CVE-2012-5611
Published: December 3, 2012 / Updated: August 4, 2020
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a long argument to the GRANT FILE command. per http://www.openwall. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2012-1551.html
- http://rhn.redhat.com/errata/RHSA-2013-0180.html
- http://seclists.org/fulldisclosure/2012/Dec/4
- http://secunia.com/advisories/51443
- http://secunia.com/advisories/53372
- http://security.gentoo.org/glsa/glsa-201308-06.xml
- http://www.debian.org/security/2012/dsa-2581
- http://www.exploit-db.com/exploits/23075
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:102
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
- http://www.openwall.com/lists/oss-security/2012/12/02/3
- http://www.openwall.com/lists/oss-security/2012/12/02/4
- http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
- http://www.ubuntu.com/usn/USN-1658-1
- http://www.ubuntu.com/usn/USN-1703-1
- https://kb.askmonty.org/en/mariadb-5166-release-notes/
- https://kb.askmonty.org/en/mariadb-5213-release-notes/
- https://kb.askmonty.org/en/mariadb-5311-release-notes/
- https://kb.askmonty.org/en/mariadb-5528a-release-notes/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16395