Use-after-free in DBD-mysql and Debian Linux - CVE-2015-8949
Published: August 20, 2016 / Updated: August 9, 2020
Vulnerability identifier: #VU40137
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2015-8949
CWE-ID: CWE-416
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: CAPTTOFU
Debian
Debian
Affected software:
DBD-mysql
Debian Linux
DBD-mysql
Debian Linux
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Use-after-free vulnerability in the my_login function in DBD::mysql before 4.033_01 allows attackers to have unspecified impact by leveraging a call to mysql_errno after a failure of my_login.
How to mitigate CVE-2015-8949
Install update from vendor's website.
Sources
- http://www.debian.org/security/2016/dsa-3635
- http://www.openwall.com/lists/oss-security/2016/07/25/13
- http://www.openwall.com/lists/oss-security/2016/07/27/1
- http://www.securityfocus.com/bid/92118
- https://blog.fuzzing-project.org/50-Use-after-free-in-my_login-function-of-DBDmysql-Perl-module.html
- https://github.com/perl5-dbi/DBD-mysql/blob/4.033_01/Changes
- https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156
- https://github.com/perl5-dbi/DBD-mysql/pull/45
- https://security.gentoo.org/glsa/201701-51