Vulnerabilites related to symantec_veritas - netbackup_advanced_reporter
cve-2002-1374
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:19
Severity ?
Summary
The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T03:19:28.889Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20021212 Advisory 04/2002: Multiple MySQL vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
               },
               {
                  name: "20021216 [OpenPKG-SA-2002.013] OpenPKG Security Advisory (mysql)",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
               },
               {
                  name: "CLSA-2002:555",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
               },
               {
                  name: "ESA-20021213-033",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_ENGARDE",
                     "x_transferred",
                  ],
                  url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://security.e-matters.de/advisories/042002.html",
               },
               {
                  name: "DSA-212",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2002/dsa-212",
               },
               {
                  name: "RHSA-2002:288",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
               },
               {
                  name: "MDKSA-2002:087",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087",
               },
               {
                  name: "RHSA-2003:166",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2003-166.html",
               },
               {
                  name: "mysql-comchangeuser-password-bypass(10847)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10847",
               },
               {
                  name: "GLSA-200212-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
               },
               {
                  name: "SUSE-SA:2003:003",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2003_003_mysql.html",
               },
               {
                  name: "RHSA-2002:289",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2002-289.html",
               },
               {
                  name: "2002-0086",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt",
               },
               {
                  name: "6373",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/6373",
               },
               {
                  name: "IMNX-2003-7+-008-01",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_IMMUNIX",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/advisories/5269",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2002-12-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2007-10-17T00:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20021212 Advisory 04/2002: Multiple MySQL vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
            },
            {
               name: "20021216 [OpenPKG-SA-2002.013] OpenPKG Security Advisory (mysql)",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
            },
            {
               name: "CLSA-2002:555",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
            },
            {
               name: "ESA-20021213-033",
               tags: [
                  "vendor-advisory",
                  "x_refsource_ENGARDE",
               ],
               url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://security.e-matters.de/advisories/042002.html",
            },
            {
               name: "DSA-212",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2002/dsa-212",
            },
            {
               name: "RHSA-2002:288",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
            },
            {
               name: "MDKSA-2002:087",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087",
            },
            {
               name: "RHSA-2003:166",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2003-166.html",
            },
            {
               name: "mysql-comchangeuser-password-bypass(10847)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10847",
            },
            {
               name: "GLSA-200212-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
            },
            {
               name: "SUSE-SA:2003:003",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2003_003_mysql.html",
            },
            {
               name: "RHSA-2002:289",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2002-289.html",
            },
            {
               name: "2002-0086",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt",
            },
            {
               name: "6373",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/6373",
            },
            {
               name: "IMNX-2003-7+-008-01",
               tags: [
                  "vendor-advisory",
                  "x_refsource_IMMUNIX",
               ],
               url: "http://www.securityfocus.com/advisories/5269",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2002-1374",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20021212 Advisory 04/2002: Multiple MySQL vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
                  },
                  {
                     name: "20021216 [OpenPKG-SA-2002.013] OpenPKG Security Advisory (mysql)",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
                  },
                  {
                     name: "CLSA-2002:555",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
                  },
                  {
                     name: "ESA-20021213-033",
                     refsource: "ENGARDE",
                     url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
                  },
                  {
                     name: "http://security.e-matters.de/advisories/042002.html",
                     refsource: "MISC",
                     url: "http://security.e-matters.de/advisories/042002.html",
                  },
                  {
                     name: "DSA-212",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2002/dsa-212",
                  },
                  {
                     name: "RHSA-2002:288",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
                  },
                  {
                     name: "MDKSA-2002:087",
                     refsource: "MANDRAKE",
                     url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087",
                  },
                  {
                     name: "RHSA-2003:166",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2003-166.html",
                  },
                  {
                     name: "mysql-comchangeuser-password-bypass(10847)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10847",
                  },
                  {
                     name: "GLSA-200212-2",
                     refsource: "GENTOO",
                     url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
                  },
                  {
                     name: "SUSE-SA:2003:003",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2003_003_mysql.html",
                  },
                  {
                     name: "RHSA-2002:289",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2002-289.html",
                  },
                  {
                     name: "2002-0086",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt",
                  },
                  {
                     name: "6373",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/6373",
                  },
                  {
                     name: "IMNX-2003-7+-008-01",
                     refsource: "IMMUNIX",
                     url: "http://www.securityfocus.com/advisories/5269",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2002-1374",
      datePublished: "2004-09-01T04:00:00",
      dateReserved: "2002-12-16T00:00:00",
      dateUpdated: "2024-08-08T03:19:28.889Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2002-1376
Vulnerability from cvelistv5
Published
2002-12-17 05:00
Modified
2024-08-08 03:19
Severity ?
Summary
libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6, does not properly verify length fields for certain responses in the (1) read_rows or (2) read_one_row routines, which allows remote attackers to cause a denial of service and possibly execute arbitrary code.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T03:19:28.970Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20021212 Advisory 04/2002: Multiple MySQL vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
               },
               {
                  name: "20021216 [OpenPKG-SA-2002.013] OpenPKG Security Advisory (mysql)",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
               },
               {
                  name: "20021219 TSLSA-2002-0086 - mysql",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=104033188706000&w=2",
               },
               {
                  name: "6370",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/6370",
               },
               {
                  name: "CLSA-2002:555",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
               },
               {
                  name: "MDKSA-2002:087",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2002:087",
               },
               {
                  name: "20021215 GLSA: mysql",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
               },
               {
                  name: "mysql-libmysqlclient-readonerow-bo(10850)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10850",
               },
               {
                  name: "mysql-libmysqlclient-readrows-bo(10849)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10849",
               },
               {
                  name: "ESA-20021213-033",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_ENGARDE",
                     "x_transferred",
                  ],
                  url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://security.e-matters.de/advisories/042002.html",
               },
               {
                  name: "6374",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/6374",
               },
               {
                  name: "DSA-212",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2002/dsa-212",
               },
               {
                  name: "RHSA-2002:288",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2002-12-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6, does not properly verify length fields for certain responses in the (1) read_rows or (2) read_one_row routines, which allows remote attackers to cause a denial of service and possibly execute arbitrary code.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20021212 Advisory 04/2002: Multiple MySQL vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
            },
            {
               name: "20021216 [OpenPKG-SA-2002.013] OpenPKG Security Advisory (mysql)",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
            },
            {
               name: "20021219 TSLSA-2002-0086 - mysql",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=104033188706000&w=2",
            },
            {
               name: "6370",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/6370",
            },
            {
               name: "CLSA-2002:555",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
            },
            {
               name: "MDKSA-2002:087",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2002:087",
            },
            {
               name: "20021215 GLSA: mysql",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
            },
            {
               name: "mysql-libmysqlclient-readonerow-bo(10850)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10850",
            },
            {
               name: "mysql-libmysqlclient-readrows-bo(10849)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10849",
            },
            {
               name: "ESA-20021213-033",
               tags: [
                  "vendor-advisory",
                  "x_refsource_ENGARDE",
               ],
               url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://security.e-matters.de/advisories/042002.html",
            },
            {
               name: "6374",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/6374",
            },
            {
               name: "DSA-212",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2002/dsa-212",
            },
            {
               name: "RHSA-2002:288",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2002-1376",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6, does not properly verify length fields for certain responses in the (1) read_rows or (2) read_one_row routines, which allows remote attackers to cause a denial of service and possibly execute arbitrary code.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20021212 Advisory 04/2002: Multiple MySQL vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
                  },
                  {
                     name: "20021216 [OpenPKG-SA-2002.013] OpenPKG Security Advisory (mysql)",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
                  },
                  {
                     name: "20021219 TSLSA-2002-0086 - mysql",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=104033188706000&w=2",
                  },
                  {
                     name: "6370",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/6370",
                  },
                  {
                     name: "CLSA-2002:555",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
                  },
                  {
                     name: "MDKSA-2002:087",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2002:087",
                  },
                  {
                     name: "20021215 GLSA: mysql",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
                  },
                  {
                     name: "mysql-libmysqlclient-readonerow-bo(10850)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10850",
                  },
                  {
                     name: "mysql-libmysqlclient-readrows-bo(10849)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10849",
                  },
                  {
                     name: "ESA-20021213-033",
                     refsource: "ENGARDE",
                     url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
                  },
                  {
                     name: "http://security.e-matters.de/advisories/042002.html",
                     refsource: "MISC",
                     url: "http://security.e-matters.de/advisories/042002.html",
                  },
                  {
                     name: "6374",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/6374",
                  },
                  {
                     name: "DSA-212",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2002/dsa-212",
                  },
                  {
                     name: "RHSA-2002:288",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2002-1376",
      datePublished: "2002-12-17T05:00:00",
      dateReserved: "2002-12-16T00:00:00",
      dateUpdated: "2024-08-08T03:19:28.970Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2002-1375
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:19
Severity ?
Summary
The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6, allows remote attackers to execute arbitrary code via a long response.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T03:19:28.826Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20021212 Advisory 04/2002: Multiple MySQL vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
               },
               {
                  name: "20021216 [OpenPKG-SA-2002.013] OpenPKG Security Advisory (mysql)",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
               },
               {
                  name: "CLSA-2002:555",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
               },
               {
                  name: "ESA-20021213-033",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_ENGARDE",
                     "x_transferred",
                  ],
                  url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://security.e-matters.de/advisories/042002.html",
               },
               {
                  name: "DSA-212",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2002/dsa-212",
               },
               {
                  name: "RHSA-2002:288",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
               },
               {
                  name: "mysql-comchangeuser-password-bo(10848)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10848",
               },
               {
                  name: "MDKSA-2002:087",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087",
               },
               {
                  name: "RHSA-2003:166",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2003-166.html",
               },
               {
                  name: "GLSA-200212-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
               },
               {
                  name: "SUSE-SA:2003:003",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2003_003_mysql.html",
               },
               {
                  name: "6375",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/6375",
               },
               {
                  name: "RHSA-2002:289",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2002-289.html",
               },
               {
                  name: "2002-0086",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt",
               },
               {
                  name: "IMNX-2003-7+-008-01",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_IMMUNIX",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/advisories/5269",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2002-12-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6, allows remote attackers to execute arbitrary code via a long response.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2007-10-17T00:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20021212 Advisory 04/2002: Multiple MySQL vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
            },
            {
               name: "20021216 [OpenPKG-SA-2002.013] OpenPKG Security Advisory (mysql)",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
            },
            {
               name: "CLSA-2002:555",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
            },
            {
               name: "ESA-20021213-033",
               tags: [
                  "vendor-advisory",
                  "x_refsource_ENGARDE",
               ],
               url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://security.e-matters.de/advisories/042002.html",
            },
            {
               name: "DSA-212",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2002/dsa-212",
            },
            {
               name: "RHSA-2002:288",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
            },
            {
               name: "mysql-comchangeuser-password-bo(10848)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10848",
            },
            {
               name: "MDKSA-2002:087",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087",
            },
            {
               name: "RHSA-2003:166",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2003-166.html",
            },
            {
               name: "GLSA-200212-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
            },
            {
               name: "SUSE-SA:2003:003",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2003_003_mysql.html",
            },
            {
               name: "6375",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/6375",
            },
            {
               name: "RHSA-2002:289",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2002-289.html",
            },
            {
               name: "2002-0086",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt",
            },
            {
               name: "IMNX-2003-7+-008-01",
               tags: [
                  "vendor-advisory",
                  "x_refsource_IMMUNIX",
               ],
               url: "http://www.securityfocus.com/advisories/5269",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2002-1375",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6, allows remote attackers to execute arbitrary code via a long response.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20021212 Advisory 04/2002: Multiple MySQL vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
                  },
                  {
                     name: "20021216 [OpenPKG-SA-2002.013] OpenPKG Security Advisory (mysql)",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
                  },
                  {
                     name: "CLSA-2002:555",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
                  },
                  {
                     name: "ESA-20021213-033",
                     refsource: "ENGARDE",
                     url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
                  },
                  {
                     name: "http://security.e-matters.de/advisories/042002.html",
                     refsource: "MISC",
                     url: "http://security.e-matters.de/advisories/042002.html",
                  },
                  {
                     name: "DSA-212",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2002/dsa-212",
                  },
                  {
                     name: "RHSA-2002:288",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
                  },
                  {
                     name: "mysql-comchangeuser-password-bo(10848)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10848",
                  },
                  {
                     name: "MDKSA-2002:087",
                     refsource: "MANDRAKE",
                     url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087",
                  },
                  {
                     name: "RHSA-2003:166",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2003-166.html",
                  },
                  {
                     name: "GLSA-200212-2",
                     refsource: "GENTOO",
                     url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
                  },
                  {
                     name: "SUSE-SA:2003:003",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2003_003_mysql.html",
                  },
                  {
                     name: "6375",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/6375",
                  },
                  {
                     name: "RHSA-2002:289",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2002-289.html",
                  },
                  {
                     name: "2002-0086",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt",
                  },
                  {
                     name: "IMNX-2003-7+-008-01",
                     refsource: "IMMUNIX",
                     url: "http://www.securityfocus.com/advisories/5269",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2002-1375",
      datePublished: "2004-09-01T04:00:00",
      dateReserved: "2002-12-16T00:00:00",
      dateUpdated: "2024-08-08T03:19:28.826Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2002-12-23 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6, does not properly verify length fields for certain responses in the (1) read_rows or (2) read_one_row routines, which allows remote attackers to cause a denial of service and possibly execute arbitrary code.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555
cve@mitre.orghttp://marc.info/?l=bugtraq&m=103971644013961&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=104004857201968&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=104005886114500&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=104033188706000&w=2
cve@mitre.orghttp://security.e-matters.de/advisories/042002.html
cve@mitre.orghttp://www.debian.org/security/2002/dsa-212
cve@mitre.orghttp://www.linuxsecurity.com/advisories/engarde_advisory-2660.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2002:087
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2002-288.html
cve@mitre.orghttp://www.securityfocus.com/bid/6370Patch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/6374Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/10849
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/10850
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=103971644013961&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=104004857201968&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=104005886114500&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=104033188706000&w=2
af854a3a-2127-422b-91ae-364da2661108http://security.e-matters.de/advisories/042002.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2002/dsa-212
af854a3a-2127-422b-91ae-364da2661108http://www.linuxsecurity.com/advisories/engarde_advisory-2660.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2002:087
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2002-288.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/6370Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/6374Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/10849
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/10850
Impacted products
Vendor Product Version
oracle mysql 3.22.26
oracle mysql 3.22.27
oracle mysql 3.22.28
oracle mysql 3.22.29
oracle mysql 3.22.30
oracle mysql 3.22.32
oracle mysql 3.23.2
oracle mysql 3.23.3
oracle mysql 3.23.4
oracle mysql 3.23.5
oracle mysql 3.23.8
oracle mysql 3.23.9
oracle mysql 3.23.10
oracle mysql 3.23.23
oracle mysql 3.23.24
oracle mysql 3.23.25
oracle mysql 3.23.26
oracle mysql 3.23.27
oracle mysql 3.23.28
oracle mysql 3.23.29
oracle mysql 3.23.30
oracle mysql 3.23.31
oracle mysql 3.23.34
oracle mysql 3.23.36
oracle mysql 3.23.37
oracle mysql 3.23.38
oracle mysql 3.23.39
oracle mysql 3.23.40
oracle mysql 3.23.41
oracle mysql 3.23.42
oracle mysql 3.23.43
oracle mysql 3.23.44
oracle mysql 3.23.45
oracle mysql 3.23.46
oracle mysql 3.23.47
oracle mysql 3.23.48
oracle mysql 3.23.49
oracle mysql 3.23.50
oracle mysql 3.23.51
oracle mysql 3.23.52
oracle mysql 3.23.53
oracle mysql 3.23.53a
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.5a
symantec_veritas netbackup_advanced_reporter 3.4
symantec_veritas netbackup_advanced_reporter 4.5
symantec_veritas netbackup_advanced_reporter 4.5_fp1
symantec_veritas netbackup_advanced_reporter 4.5_fp2
symantec_veritas netbackup_advanced_reporter 4.5_fp3
symantec_veritas netbackup_advanced_reporter 4.5_mp1
symantec_veritas netbackup_advanced_reporter 4.5_mp2
symantec_veritas netbackup_advanced_reporter 4.5_mp3
symantec_veritas netbackup_global_data_manager 4.5
symantec_veritas netbackup_global_data_manager 4.5_fp1
symantec_veritas netbackup_global_data_manager 4.5_fp2
symantec_veritas netbackup_global_data_manager 4.5_fp3
symantec_veritas netbackup_global_data_manager 4.5_mp1
symantec_veritas netbackup_global_data_manager 4.5_mp2
symantec_veritas netbackup_global_data_manager 4.5_mp3



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "C883DB55-0CAC-462A-912B-69E9E7E1C79C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AD5549-07DC-43DA-B277-D7BF16ABE4E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "787CB28C-74C6-4356-8AB3-4183CD941EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "C30459B9-0FAC-48DF-9601-AAD1A028846F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "86DC48D3-09F1-48BD-A783-0549D4D5E8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*",
                     matchCriteriaId: "209E0C63-FC71-4E19-B3D5-BCB71A758252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "268CDE97-C837-482A-BB16-77662C45074C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E04B7CC-9E17-47AB-8923-A4DBD24119FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0BE4B79-BF2A-4323-B337-62B388FCF9D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "18E35942-7E70-468E-BA15-97CA5086C1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCB886BB-EA7C-4618-9029-BB16A45A4301",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "56EC4832-82D1-4E57-86DA-8918CA006723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3BCEB43-67D4-4711-8C30-4D2D93159EDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "362893B4-9BC1-4584-ACD5-08878A19E3C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD940715-318E-44C1-8613-FEBFB8F1741A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "167130D3-2AD2-4B82-B805-6A0BA45C4DCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "17187451-7715-464D-9C7B-3F949345CF2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE3658E1-B451-4B8B-A21A-3D66359D21DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
                     matchCriteriaId: "041AD718-39A7-4B13-90C5-680743B1C982",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD26FA75-C3C5-434C-9A82-E5F798A8E47C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
                     matchCriteriaId: "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA0C0EE5-B2AA-4862-B144-24733CC86A2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
                     matchCriteriaId: "536F109A-7932-4424-889E-02922D8B783D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
                     matchCriteriaId: "036AE068-C061-49B1-95D1-98A09A79EE25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7A83184-F554-42C0-8162-B484CBAD09D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9244622-781A-46AE-866D-0EDDE5323048",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA85DD18-19D9-4BF8-8420-DEA24AE44046",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
                     matchCriteriaId: "670C3F10-A811-43D0-B762-5791D41C8B78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F379312-B95D-4C9B-918F-6A57B12EB5A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
                     matchCriteriaId: "C36F606D-59B6-4FA0-8785-3B14592FE9CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
                     matchCriteriaId: "2681F9FF-5899-4EFA-85A3-CEAB4402C786",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
                     matchCriteriaId: "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
                     matchCriteriaId: "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
                     matchCriteriaId: "50FC2146-5BC0-4CA6-8700-5877C01B777D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
                     matchCriteriaId: "F79AFBCE-FFF7-4348-BE17-42A7978E17E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A3C056E-EEB9-4B95-A155-F71B80B9695D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "41BEAD26-ADDC-4FC6-A493-584315183936",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "153E8DFB-4197-4117-87C6-C0FBE3C05600",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "765BF98E-7AB1-45EA-9935-2C311E621211",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9654E8E-FECD-4C92-9E91-43ADF02C93D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A65F884-02AB-4169-B695-DC040991D06C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DC7D206-BF39-4A79-9D05-4DDD1C6242C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB9922F-4BA9-48D4-B95F-4DF0C87CEB57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C425B3-8CE5-41C7-9BA2-9A596D78EAC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "01AA2F84-C1B7-44A6-9FD3-E9CA7BF0CF59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9E1A1EF-E6C8-4AF4-95AC-048BE89C3E3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD74A87-CAE9-495E-8159-6AAF8D457824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E8B2231-9796-4974-B40B-5C461D686CA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0CB7D5A-73E9-4899-A885-5A6745614ACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7A6601-ED3C-4518-BD4F-8D5BFB5F73C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A304AA0E-09F4-4612-ADF8-116078A7CEF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4051ECB-4173-4EB5-B7BD-4AF9C0361837",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9197EF82-C76E-41C2-81B6-AE57FC5EC51E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "821DB1D4-635F-456D-A6E1-F4F2978F097E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6, does not properly verify length fields for certain responses in the (1) read_rows or (2) read_one_row routines, which allows remote attackers to cause a denial of service and possibly execute arbitrary code.",
      },
      {
         lang: "es",
         value: "La librería de cliente libmysqlclient en MySQL 3.x a 3.23.54 y 4.x a 4.06, no verifica adecuadamente longitudes de campos de ciertas respuestas en las rutinas read_rows o read_one_row, lo que permite a a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario.",
      },
   ],
   id: "CVE-2002-1376",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: true,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2002-12-23T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=104033188706000&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.e-matters.de/advisories/042002.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2002/dsa-212",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2002:087",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/6370",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/6374",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10849",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10850",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=104033188706000&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.e-matters.de/advisories/042002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2002/dsa-212",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2002:087",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/6370",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/6374",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10849",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10850",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2002-12-23 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555
cve@mitre.orghttp://marc.info/?l=bugtraq&m=103971644013961&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=104004857201968&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=104005886114500&w=2
cve@mitre.orghttp://security.e-matters.de/advisories/042002.html
cve@mitre.orghttp://www.debian.org/security/2002/dsa-212
cve@mitre.orghttp://www.linuxsecurity.com/advisories/engarde_advisory-2660.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2003_003_mysql.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2002-288.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2002-289.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-166.html
cve@mitre.orghttp://www.securityfocus.com/advisories/5269
cve@mitre.orghttp://www.securityfocus.com/bid/6373Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/10847
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=103971644013961&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=104004857201968&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=104005886114500&w=2
af854a3a-2127-422b-91ae-364da2661108http://security.e-matters.de/advisories/042002.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2002/dsa-212
af854a3a-2127-422b-91ae-364da2661108http://www.linuxsecurity.com/advisories/engarde_advisory-2660.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2003_003_mysql.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2002-288.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2002-289.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-166.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/5269
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/6373Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/10847
Impacted products
Vendor Product Version
oracle mysql 3.22.26
oracle mysql 3.22.27
oracle mysql 3.22.28
oracle mysql 3.22.29
oracle mysql 3.22.30
oracle mysql 3.22.32
oracle mysql 3.23.2
oracle mysql 3.23.3
oracle mysql 3.23.4
oracle mysql 3.23.5
oracle mysql 3.23.8
oracle mysql 3.23.9
oracle mysql 3.23.10
oracle mysql 3.23.23
oracle mysql 3.23.24
oracle mysql 3.23.25
oracle mysql 3.23.26
oracle mysql 3.23.27
oracle mysql 3.23.28
oracle mysql 3.23.29
oracle mysql 3.23.30
oracle mysql 3.23.31
oracle mysql 3.23.34
oracle mysql 3.23.36
oracle mysql 3.23.37
oracle mysql 3.23.38
oracle mysql 3.23.39
oracle mysql 3.23.40
oracle mysql 3.23.41
oracle mysql 3.23.42
oracle mysql 3.23.43
oracle mysql 3.23.44
oracle mysql 3.23.45
oracle mysql 3.23.46
oracle mysql 3.23.47
oracle mysql 3.23.48
oracle mysql 3.23.49
oracle mysql 3.23.50
oracle mysql 3.23.51
oracle mysql 3.23.52
oracle mysql 3.23.53
oracle mysql 3.23.53a
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.5a
symantec_veritas netbackup_advanced_reporter 3.4
symantec_veritas netbackup_advanced_reporter 4.5
symantec_veritas netbackup_advanced_reporter 4.5_fp1
symantec_veritas netbackup_advanced_reporter 4.5_fp2
symantec_veritas netbackup_advanced_reporter 4.5_fp3
symantec_veritas netbackup_advanced_reporter 4.5_mp1
symantec_veritas netbackup_advanced_reporter 4.5_mp2
symantec_veritas netbackup_advanced_reporter 4.5_mp3
symantec_veritas netbackup_global_data_manager 4.5
symantec_veritas netbackup_global_data_manager 4.5_fp1
symantec_veritas netbackup_global_data_manager 4.5_fp2
symantec_veritas netbackup_global_data_manager 4.5_fp3
symantec_veritas netbackup_global_data_manager 4.5_mp1
symantec_veritas netbackup_global_data_manager 4.5_mp2
symantec_veritas netbackup_global_data_manager 4.5_mp3



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "C883DB55-0CAC-462A-912B-69E9E7E1C79C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AD5549-07DC-43DA-B277-D7BF16ABE4E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "787CB28C-74C6-4356-8AB3-4183CD941EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "C30459B9-0FAC-48DF-9601-AAD1A028846F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "86DC48D3-09F1-48BD-A783-0549D4D5E8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*",
                     matchCriteriaId: "209E0C63-FC71-4E19-B3D5-BCB71A758252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "268CDE97-C837-482A-BB16-77662C45074C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E04B7CC-9E17-47AB-8923-A4DBD24119FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0BE4B79-BF2A-4323-B337-62B388FCF9D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "18E35942-7E70-468E-BA15-97CA5086C1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCB886BB-EA7C-4618-9029-BB16A45A4301",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "56EC4832-82D1-4E57-86DA-8918CA006723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3BCEB43-67D4-4711-8C30-4D2D93159EDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "362893B4-9BC1-4584-ACD5-08878A19E3C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD940715-318E-44C1-8613-FEBFB8F1741A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "167130D3-2AD2-4B82-B805-6A0BA45C4DCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "17187451-7715-464D-9C7B-3F949345CF2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE3658E1-B451-4B8B-A21A-3D66359D21DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
                     matchCriteriaId: "041AD718-39A7-4B13-90C5-680743B1C982",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD26FA75-C3C5-434C-9A82-E5F798A8E47C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
                     matchCriteriaId: "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA0C0EE5-B2AA-4862-B144-24733CC86A2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
                     matchCriteriaId: "536F109A-7932-4424-889E-02922D8B783D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
                     matchCriteriaId: "036AE068-C061-49B1-95D1-98A09A79EE25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7A83184-F554-42C0-8162-B484CBAD09D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9244622-781A-46AE-866D-0EDDE5323048",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA85DD18-19D9-4BF8-8420-DEA24AE44046",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
                     matchCriteriaId: "670C3F10-A811-43D0-B762-5791D41C8B78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F379312-B95D-4C9B-918F-6A57B12EB5A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
                     matchCriteriaId: "C36F606D-59B6-4FA0-8785-3B14592FE9CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
                     matchCriteriaId: "2681F9FF-5899-4EFA-85A3-CEAB4402C786",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
                     matchCriteriaId: "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
                     matchCriteriaId: "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
                     matchCriteriaId: "50FC2146-5BC0-4CA6-8700-5877C01B777D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
                     matchCriteriaId: "F79AFBCE-FFF7-4348-BE17-42A7978E17E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A3C056E-EEB9-4B95-A155-F71B80B9695D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "41BEAD26-ADDC-4FC6-A493-584315183936",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "153E8DFB-4197-4117-87C6-C0FBE3C05600",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "765BF98E-7AB1-45EA-9935-2C311E621211",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9654E8E-FECD-4C92-9E91-43ADF02C93D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A65F884-02AB-4169-B695-DC040991D06C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DC7D206-BF39-4A79-9D05-4DDD1C6242C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB9922F-4BA9-48D4-B95F-4DF0C87CEB57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C425B3-8CE5-41C7-9BA2-9A596D78EAC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "01AA2F84-C1B7-44A6-9FD3-E9CA7BF0CF59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9E1A1EF-E6C8-4AF4-95AC-048BE89C3E3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD74A87-CAE9-495E-8159-6AAF8D457824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E8B2231-9796-4974-B40B-5C461D686CA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0CB7D5A-73E9-4899-A885-5A6745614ACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7A6601-ED3C-4518-BD4F-8D5BFB5F73C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A304AA0E-09F4-4612-ADF8-116078A7CEF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4051ECB-4173-4EB5-B7BD-4AF9C0361837",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9197EF82-C76E-41C2-81B6-AE57FC5EC51E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "821DB1D4-635F-456D-A6E1-F4F2978F097E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password.",
      },
      {
         lang: "es",
         value: "El comando COM_CHANGE_USER en MySQL 3.x anterirores de 3.23.54 y 4.x anteriores a 4.0.5 permite a atacantes remotos ganar privilegios mediante un ataque de fuerza bruta usando una contraseña de un carácter, lo que hace que MySQL compare la contraseña suministrada sólo con el primer carácter de la contraseña real.",
      },
   ],
   id: "CVE-2002-1374",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: true,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2002-12-23T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.e-matters.de/advisories/042002.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2002/dsa-212",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2003_003_mysql.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2002-289.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2003-166.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/advisories/5269",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/6373",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10847",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.e-matters.de/advisories/042002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2002/dsa-212",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2003_003_mysql.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2002-289.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2003-166.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/advisories/5269",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/6373",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10847",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2002-12-23 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6, allows remote attackers to execute arbitrary code via a long response.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555
cve@mitre.orghttp://marc.info/?l=bugtraq&m=103971644013961&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=104004857201968&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=104005886114500&w=2
cve@mitre.orghttp://security.e-matters.de/advisories/042002.html
cve@mitre.orghttp://www.debian.org/security/2002/dsa-212
cve@mitre.orghttp://www.linuxsecurity.com/advisories/engarde_advisory-2660.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2003_003_mysql.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2002-288.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2002-289.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-166.html
cve@mitre.orghttp://www.securityfocus.com/advisories/5269
cve@mitre.orghttp://www.securityfocus.com/bid/6375Patch, Vendor Advisory
cve@mitre.orghttp://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/10848
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=103971644013961&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=104004857201968&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=104005886114500&w=2
af854a3a-2127-422b-91ae-364da2661108http://security.e-matters.de/advisories/042002.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2002/dsa-212
af854a3a-2127-422b-91ae-364da2661108http://www.linuxsecurity.com/advisories/engarde_advisory-2660.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2003_003_mysql.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2002-288.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2002-289.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-166.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/5269
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/6375Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/10848
Impacted products
Vendor Product Version
oracle mysql 3.22.26
oracle mysql 3.22.27
oracle mysql 3.22.28
oracle mysql 3.22.29
oracle mysql 3.22.30
oracle mysql 3.22.32
oracle mysql 3.23.2
oracle mysql 3.23.3
oracle mysql 3.23.4
oracle mysql 3.23.5
oracle mysql 3.23.8
oracle mysql 3.23.9
oracle mysql 3.23.10
oracle mysql 3.23.23
oracle mysql 3.23.24
oracle mysql 3.23.25
oracle mysql 3.23.26
oracle mysql 3.23.27
oracle mysql 3.23.28
oracle mysql 3.23.29
oracle mysql 3.23.30
oracle mysql 3.23.31
oracle mysql 3.23.34
oracle mysql 3.23.36
oracle mysql 3.23.37
oracle mysql 3.23.38
oracle mysql 3.23.39
oracle mysql 3.23.40
oracle mysql 3.23.41
oracle mysql 3.23.42
oracle mysql 3.23.43
oracle mysql 3.23.44
oracle mysql 3.23.45
oracle mysql 3.23.46
oracle mysql 3.23.47
oracle mysql 3.23.48
oracle mysql 3.23.49
oracle mysql 3.23.50
oracle mysql 3.23.51
oracle mysql 3.23.52
oracle mysql 3.23.53
oracle mysql 3.23.53a
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.5a
symantec_veritas netbackup_advanced_reporter 3.4
symantec_veritas netbackup_advanced_reporter 4.5
symantec_veritas netbackup_advanced_reporter 4.5_fp1
symantec_veritas netbackup_advanced_reporter 4.5_fp2
symantec_veritas netbackup_advanced_reporter 4.5_fp3
symantec_veritas netbackup_advanced_reporter 4.5_mp1
symantec_veritas netbackup_advanced_reporter 4.5_mp2
symantec_veritas netbackup_advanced_reporter 4.5_mp3
symantec_veritas netbackup_global_data_manager 4.5
symantec_veritas netbackup_global_data_manager 4.5_fp1
symantec_veritas netbackup_global_data_manager 4.5_fp2
symantec_veritas netbackup_global_data_manager 4.5_fp3
symantec_veritas netbackup_global_data_manager 4.5_mp1
symantec_veritas netbackup_global_data_manager 4.5_mp2
symantec_veritas netbackup_global_data_manager 4.5_mp3



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "C883DB55-0CAC-462A-912B-69E9E7E1C79C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AD5549-07DC-43DA-B277-D7BF16ABE4E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "787CB28C-74C6-4356-8AB3-4183CD941EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "C30459B9-0FAC-48DF-9601-AAD1A028846F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "86DC48D3-09F1-48BD-A783-0549D4D5E8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*",
                     matchCriteriaId: "209E0C63-FC71-4E19-B3D5-BCB71A758252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "268CDE97-C837-482A-BB16-77662C45074C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E04B7CC-9E17-47AB-8923-A4DBD24119FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0BE4B79-BF2A-4323-B337-62B388FCF9D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "18E35942-7E70-468E-BA15-97CA5086C1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCB886BB-EA7C-4618-9029-BB16A45A4301",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "56EC4832-82D1-4E57-86DA-8918CA006723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3BCEB43-67D4-4711-8C30-4D2D93159EDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "362893B4-9BC1-4584-ACD5-08878A19E3C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD940715-318E-44C1-8613-FEBFB8F1741A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "167130D3-2AD2-4B82-B805-6A0BA45C4DCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "17187451-7715-464D-9C7B-3F949345CF2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE3658E1-B451-4B8B-A21A-3D66359D21DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
                     matchCriteriaId: "041AD718-39A7-4B13-90C5-680743B1C982",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD26FA75-C3C5-434C-9A82-E5F798A8E47C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
                     matchCriteriaId: "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA0C0EE5-B2AA-4862-B144-24733CC86A2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
                     matchCriteriaId: "536F109A-7932-4424-889E-02922D8B783D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
                     matchCriteriaId: "036AE068-C061-49B1-95D1-98A09A79EE25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7A83184-F554-42C0-8162-B484CBAD09D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9244622-781A-46AE-866D-0EDDE5323048",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA85DD18-19D9-4BF8-8420-DEA24AE44046",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
                     matchCriteriaId: "670C3F10-A811-43D0-B762-5791D41C8B78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F379312-B95D-4C9B-918F-6A57B12EB5A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
                     matchCriteriaId: "C36F606D-59B6-4FA0-8785-3B14592FE9CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
                     matchCriteriaId: "2681F9FF-5899-4EFA-85A3-CEAB4402C786",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
                     matchCriteriaId: "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
                     matchCriteriaId: "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
                     matchCriteriaId: "50FC2146-5BC0-4CA6-8700-5877C01B777D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
                     matchCriteriaId: "F79AFBCE-FFF7-4348-BE17-42A7978E17E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A3C056E-EEB9-4B95-A155-F71B80B9695D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "41BEAD26-ADDC-4FC6-A493-584315183936",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "153E8DFB-4197-4117-87C6-C0FBE3C05600",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "765BF98E-7AB1-45EA-9935-2C311E621211",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9654E8E-FECD-4C92-9E91-43ADF02C93D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A65F884-02AB-4169-B695-DC040991D06C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DC7D206-BF39-4A79-9D05-4DDD1C6242C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB9922F-4BA9-48D4-B95F-4DF0C87CEB57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C425B3-8CE5-41C7-9BA2-9A596D78EAC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "01AA2F84-C1B7-44A6-9FD3-E9CA7BF0CF59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9E1A1EF-E6C8-4AF4-95AC-048BE89C3E3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD74A87-CAE9-495E-8159-6AAF8D457824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E8B2231-9796-4974-B40B-5C461D686CA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0CB7D5A-73E9-4899-A885-5A6745614ACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7A6601-ED3C-4518-BD4F-8D5BFB5F73C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A304AA0E-09F4-4612-ADF8-116078A7CEF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4051ECB-4173-4EB5-B7BD-4AF9C0361837",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9197EF82-C76E-41C2-81B6-AE57FC5EC51E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "821DB1D4-635F-456D-A6E1-F4F2978F097E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6, allows remote attackers to execute arbitrary code via a long response.",
      },
      {
         lang: "es",
         value: "El comando COM_CHANGE_USER en MySQL 3.x anteriores a 2.23.54 y 4.x anterior a 4.0.6 permite a atacantes remotos ejecutar código arbitrario mediante una respuesta larga.",
      },
   ],
   id: "CVE-2002-1375",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: true,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2002-12-23T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.e-matters.de/advisories/042002.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2002/dsa-212",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2003_003_mysql.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2002-289.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2003-166.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/advisories/5269",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/6375",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10848",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=103971644013961&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=104004857201968&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=104005886114500&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.e-matters.de/advisories/042002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2002/dsa-212",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2003_003_mysql.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2002-288.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2002-289.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2003-166.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/advisories/5269",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/6375",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10848",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}