#VU43713 SQL injection in mysql - CVE-2009-5026


| Updated: 2020-08-11

Vulnerability identifier: #VU43713

Vulnerability risk: Medium

CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2009-5026

CWE-ID: CWE-89

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
mysql

Vendor: Google

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The executable comment feature in MySQL 5.0.x before 5.0.93 and 5.1.x before 5.1.50, when running in certain slave configurations in which the slave is running a newer version than the master, allows remote attackers to execute arbitrary SQL commands via custom comments.

Mitigation
Install update from vendor's website.

Vulnerable software versions

mysql: 5.0.0 - 5.1.49


External links
https://bugs.mysql.com/bug.php?id=49124
https://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html
https://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html
https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
https://seclists.org/oss-sec/2011/q4/101
https://secunia.com/advisories/49179
https://bugzilla.redhat.com/show_bug.cgi?id=640177


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability