Use-after-free in DBD-mysql - CVE-2016-1251
Published: November 29, 2016 / Updated: August 9, 2020
Vulnerability identifier: #VU39998
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2016-1251
CWE-ID: CWE-416
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: CAPTTOFU
Affected software:
DBD-mysql
DBD-mysql
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.
How to mitigate CVE-2016-1251
Install update from vendor's website.
Sources
- http://www.openwall.com/lists/oss-security/2016/11/28/2
- http://www.securityfocus.com/bid/94573
- https://anonscm.debian.org/cgit/pkg-perl/packages/libdbd-mysql-perl.git/commit/?id=a8b97e4713391b1f8beffbfddac483c276feaff1
- https://github.com/perl5-dbi/DBD-mysql/commit/3619c170461a3107a258d1fd2d00ed4832adb1b1
- https://security.gentoo.org/glsa/201701-51
- https://tracker.debian.org/news/819888